Continental Breakfast 7:30am - 8:45am
Break with Refreshments 10:00am - 10:30am
Short Break
Break with Refreshments 3:40pm - 4:10pm
Lunch 12:00pm - 1:15pm
Opening Remarks, D...
The Emperor's New Clothes: Location Data and the Promise of Anon... 9:00am - 10:00am
How Geopolitical Change Causes P... 10:30am - 11:00am
Technology Abuse Clinics for Sur... 11:00am - 11:30am
Working on the Frontlines: Priva... 11:30am - 12:00pm
Fireside Chat with Simson Garfinkel on Quantum T... 1:15pm - 2:00pm
The Edge of Developed Practice i... 2:10pm - 2:40pm
Adventures in Authentication and... 2:40pm - 3:10pm
Navigating the Sandbox Buffet 3:10pm - 3:40pm
The Dirty Laundry of the Web PKI 4:10pm - 4:40pm
When Malware Changed Its Mind: H... 4:40pm - 5:10pm
Spotting the Differences: Quirks... 5:10pm - 5:40pm
Continental Breakfast 7:30am - 8:55am
Conference Reception 5:40pm - 7:10pm
Fireside Chat: The State of Memory Safety 9:00am - 10:00am
How the Internet Improves Humani... 10:30am - 11:00am
Characterizing and Measuring Mis... 11:00am - 11:30am
A New Process to Tackle Misinfor... 11:30am - 12:00pm
The Not Fake News...
Metric Perversity and Bad Decisi... 1:30pm - 2:00pm
What Public Interest AI Auditors... 2:10pm - 2:40pm
Why Is Our Security Research Fai... 2:40pm - 3:10pm
Understanding Trust and Security... 3:10pm - 3:40pm
Protecting Whistleblower Informa... 4:10pm - 4:40pm
So You're Going to Blow the Whis... 4:40pm - 5:10pm
Open Source Software and Journal... 5:10pm - 5:40pm
Break with Refreshments 2:00pm - 2:30pm
Privacy Policies, by Lawyers, for Lawyers. What about Everyone E... 9:00am - 10:00am
Meaningful Hardware Privacy for... 10:30am - 11:00am
Technical Metamorphosis: The 3 S... 11:00am - 11:30am
Building an Automated Machine fo... 11:30am - 12:00pm
True Crime Journalism: Cyber 1:15pm - 2:00pm
Myths and Lies in InfoSec 2:30pm - 3:00pm
The Slippery Slope of Cybersecur... 3:00pm - 3:30pm
The Very Hungry Defender: Metamo... 3:30pm - 4:00pm
Closing Remarks