All sessions will be held in Grand Peninsula Ballroom Grand Peninsula ABCD unless otherwise noted.
Enigma 2019 Program Grid
View the program in mobile-friendly grid format.
Download Attendee List (Available to Enigma Conference Attendees)
Note: Only includes attendees who opted in to appearing on the list. Log in to your USENIX account to access this file.


Monday, January 28, 2019
7:30 am–8:45 am
Continental Breakfast
Grand Peninsula Foyer
8:45 am–9:00 am
9:00 am–10:30 am
Security for Specific User Groups
Session Chair: Wendy Nather, Duo Security
The Kids Aren't Alright—Security and Privacy in the K–12 Classroom
Rethinking the Detection of Child Sexual Abuse Imagery on the Internet
Callisto: A Cryptographic Approach to #MeToo
10:30 am–11:00 am
Break with Refreshments
Grand Peninsula Foyer
11:00 am–12:30 pm
Security in Hardware and Networking
Session Chair: Diogo Monica, Anchorage
Hardware Security Modules: The Ultimate Black Boxes
Hardware Is the New Software: Finding Exploitable Bugs in Hardware Designs
Using Architecture and Abstractions to Design a Security Layer for TLS
12:30 pm–2:00 pm
Lunch
Atrium
2:00 pm–3:30 pm
Enterprise Security
Session Chair: Melody Hildebrandt, 21st Century Fox
Privacy Engineering: Not Just for Privacy Engineers
Building Identity for an Open Perimeter
Provable Security at AWS
3:30 pm–4:00 pm
Break with Refreshments
Grand Peninsula Foyer
Sponsored by Facebook
4:00 pm–5:30 pm
Across Boundaries
Session Chair: Tim Maurer, Carnegie Endowment for International Peace
Abusability Testing: Considering the Ways Your Technology Might Be Used for Harm
Grey Science
It's Not "Our" Data: Do We Want to Create a World of No Surprises?
5:30 pm–7:00 pm
Conference Reception
Atrium
Sponsored by Google
Tuesday, January 29, 2019
8:00 am–8:55 am
Continental Breakfast
Grand Peninsula Foyer
8:55 am–9:00 am
Opening Remarks, Day 2
Program Co-Chairs: Ben Adida, VotingWorks, and Franziska Roesner, University of Washington
9:00 am–10:30 am
Cybercrime and Cyberwar
Session Chair: David Freeman, Facebook
The Offline Dimension of Online Crime
Learning from the Dark Web Dimension of Data
Countering Adversarial Cyber Campaigns
10:30 am–11:00 am
Break with Refreshments
Grand Peninsula Foyer
Sponsored by Shopify
11:00 am–12:30 pm
Payments and Cryptocurrency
Session Chair: Lea Kissner, Google
Usage of Behavioral Biometric Technologies to Defend Against Bots and Account Takeover Attacks
Cryptocurrency: Burn It with Fire
Nicholas Weaver, International Computer Science Institute (ICSI) and University of California, Berkeley
Building a Secure Data Market on Blockchain
12:30 pm–1:30 pm
Lunch
Atrium
1:30 pm–3:30 pm
Web Security
Session Chair: Julien Vehent, Mozilla
Next Steps For Browser Privacy: Pursuing Privacy Protections Beyond Extensions
User Agent 2.0: What Can the Browser Do for the User?
Where Is the Web Closed?
The URLephant in the Room
3:30 pm–4:00 pm
Break with Refreshments
Grand Peninsula Foyer
Sponsored by Uber
4:00 pm–5:00 pm
Mobile Security
Session Chair: Aanchal Gupta, Facebook
Mobile App Privacy Analysis at Scale
Serge Egelman, University of California, Berkeley, and International Computer Science Institute (ICSI)
Insider Attack Resistance in the Android Ecosystem
5:30 pm–7:00 pm
Conference Reception
Atrium
Sponsored by Netflix
Wednesday, January 30, 2019
8:00 am–8:55 am
Continental Breakfast
Grand Peninsula Foyer
8:55 am–9:00 am
Opening Remarks, Day 3
Program Co-Chairs: Ben Adida, VotingWorks, and Franziska Roesner, University of Washington
9:00 am–10:30 am
Computer Security and Government
Session Chair: Joe Calandrino, Federal Trade Commission
Digital Authoritarianism, Data Protection, and the Battle over Information Control
Mr. Lord Goes to Washington, or Applying Security outside the Tech World
Convincing the Loser: Securing Elections against Modern Threats
10:30 am–11:00 am
Break with Refreshments
Grand Peninsula Foyer
Sponsored by Dropbox
11:00 am–12:30 pm
(Mis)Configurations and Experimental Design
Session Chair: Carrie Gates, Bank of America
Moving Fast and Breaking Things: Security Misconfigurations
Stethoscope: Securely Configuring Devices without Systems Management
When the Magic Wears Off: Flaws in ML for Security Evaluations (and What to Do about It)
12:30 pm–1:30 pm
Lunch
Atrium
1:30 pm–3:00 pm
Vulnerabilities
Session Chair: Michael Coates, Altitude Networks
If Red Teaming Is Easy: You're Doing It Wrong
Why Even Experienced and Highly Intelligent Developers Write Vulnerable Code and What We Should Do about It
How to Predict Which Vulnerabilities Will Be Exploited
3:00 pm–3:30 pm
Break with Refreshments
Grand Peninsula Foyer
Sponsored by Tanium
3:30 pm–4:30 pm
Threat Modeling
Session Chair: Amie Stepanovich, Access Now
Physical OPSEC as a Metaphor for Infosec
Something You Have and Someone You Know—Designing for Interpersonal Security
4:30 pm
Closing Remarks
Program Co-Chairs: Ben Adida, VotingWorks, and Franziska Roesner, University of Washington