-
Opening Words
- Sylvain Pasini
-
Improving Security Maturity
With Bug Bounties
- Martina Schwab
-
The Printer Goes Brrrr
- Thomas Jeunet,Mehdi Talbi and Rémi Jullian
-
Firmwares Are Weird. A Year Long
Journey To Efficient Extraction
- Quentin Kaiser
-
Benchmarking Memory Allocators
- Julien Voisin
-
Hardware Attacks Against SM4 In Practice
- Sylvain Pelissier and Nicolas Oberli
-
Generic Remote Exploit Techniques
For The PHP Allocator, And 0days
- Charles Fol
-
The Smart Home I Didn't Ask For
- Nils Amiet
-
Ghidra Fault Emulation
- Roman Korkikian
-
Opening Words
- Sylvain Pasini
-
The Long And Winding Road Towards
Secure Confidential Cloud Computing
- Elena Reshetova
-
Some Cracks In The Linux Firewall
- Arthur Mongodin
-
Exploiting Secrets - How Leaked Credentials
Can Be Exploited To Gain Access
- Mackenzie Jackson
-
NTLM Relay:
The Attack That Keeps On Giving
- Sylvain Heiniger
-
CSP, XSS, WTF?
- Kevin Guerroudj and Wadeck Follonier
-
A Journey To Pwn And Own
The Sonos One Speaker
- Berard David
-
Vous N'écrirez Plus De Script Frida
- Axelle Apvrille
-
Rump Session
- Various