-
Welcome Address
- Patricia M. Zorko
-
Beyond FBI Vs Apple:
What's Next For The Crypto Wars?
- John Adams
-
Virtualization System Vulnerability
Discovery Framework
- Tang Qinghao
-
Hardsploit Project: An All-In-One
Tool For Hardware Security Audits
- Yann Allain and Julien Moinard
-
Escape From The
Docker-KVM-QEMU Machine
- Shengping Wang and Xu Liu
-
CSP Oddities
- Michele Spagnuolo and Lukas Weichselbaum
-
Don't Feed The Hippos
- Martin Knobloch
-
Exploiting GLIBC:
Hacking Everything (CVE-2015-7547)
- Gal De Leon and Nadav Markus
-
TeLeScope: Peering Into The Depths Of
TLS Traffic In Real-Time
- Radu Caragea
-
Kernel Exploit Hunting And Mitigation
- Broderick Aquilino and Wayne Low
-
Applying Regulatory Data To
IoT/RF Reverse Engineering
- Marc Newlin
-
Using The Observer Effect
& Cyber Feng Shui
- Jacob Torrey
-
Sandjacking: Profiting From iOS Malware
- Chilik Tamir
-
Unformation In The Era Of
Hyper Connectivity
- Elisabeth De Leeuw
-
Exploit Kits: Hunting The Hunters
- Nick Biasini
-
Iron-HID: Create Your Own Bad USB Device
- Seunghun Han
-
Pentesting Chatops
- Melanie Rieback
-
Forcing A Targeted LTE Cellphone
Into An Eavesdropping Network
- Lin Huang
-
Adaptive Android Kernel Live Patching
- Tim Xia and Yulong Zhang
-
The Future Has Arrived
And It's Effin' Hilarious!
- Adam Laurie
-
Time Is On My Side: Forging A Wireless
Time Signal To Attack NTP Servers
- Yuwei Zheng and Haoqi Shan
-
Go Speed Tracer: Guided Fuzzing
- Richard Johnson
-
Cache Side Channel Attacks:
Cpu Design As A Security Problem
- Anders Fogh
-
New Methods For Exploiting ORM
Injections In Java Applications
- Mikhail Egorov and Sergey Soldatov
-
A Series Of Unfortunate Events:
Where Malware Meets Murphy
- Mattijs van Ommeren
-
Facebook Presents Capture The Flag:
A Look At Our New Open-Source Platform
- Paul Marinescu
-
In Plain Sight: The Perfect Exfiltration
- Itzik Kotler and Amit Klein
-
Perf: From Profiling To Kernel Exploiting
- Wish Wu
-
Inspeckage - Android Package Inspector
- Antonio Martins
-
Park This - Yet Another Parking Meter Talk
- Paul Moreno
-
Attacking Next-Generation Firewalls:
Breaking PAN-OS
- Felix Wilhelm
-
Advanced Exploitation:
Xen Hypervisor VM Escape
- Shangcong Luan
-
Anatomy Of An APT Attack
- Paul Mason
-
HITC - Hack In The Class
- Barry 'Fish' van Kampen
-
Closing Comments
- Martin Knobloch
-
CANsee:
An Automobile Intrusion Detection System
- Jun Li
-
In Stickers We Trust: Breaking Naive
ESSID/WPA2 Key Generation Algorithms
- Peter 'Blasty' Geissler
-
The Bad Neighbor: Hardware Side Channels
In Virtualized Environments
- Sophia D'Antoine
-
Closing Ceremony
-