-
Hack To The Future: The Past,
Present, And Future Of Our Cyber Domain
- Elly van den Heuvel
-
Redefining Defense
- Saumil Shah
-
Disarming EMET 5.52
- Niels Warnars
-
Breaking The Fourth Wall:
Hacking Customer Information Control System
- Ayoub Elaassal
-
Femtocell Hacking: From Zero To Zero day
- JeongHoon Shin
-
A Passive Listing Ransomware Detector
- Paulus Meessen and Don Mulders
-
When Two-Factor Authentication Is A Foe:
Breaking Apple's iCloud Keychain
- Vladimir Katalov
-
We Broke All CSPs And You
Won't Believe What Happened Next!
- Michele Spagnuolo and Lukas Weichselbaum
-
Can't Touch This:
Cloning Any Android HCE Contactless Card
- Slawomir Jasek
-
Fault Injection Attacks On Secure Boot
- Niek Timmers and Albert Spruyt
-
Pwning Banks
How The Playground Evolved Over The Years
- Miika Turkia
-
A New RISC
- Don Bailey
-
The Secret Of Chakracore:
10 Ways To Go Beyond The Edge
- Linan Hao and Long Liu
-
Meet And Greet With
The MacOs Malware Class Of 2016
- Patrick Wardle
-
Drammer: The Making-Of
- Victor van der Veen
-
Side Channel Attacks Against
iOS Crypto Libraries And More
- Najwa Aara
-
Lure10: Exploiting Windows Automatic
Wireless Association Algorithm
- George Chatzisofroniou
-
So You Want To Hack Radios?
- Matt Knight and Marc Newlin
-
Harnessing Intel Processor Trace On
Windows For Vulnerability Discovery
- Richard Johnson
-
Shadow-Box:
The Practical And Omnipotent Sandbox
- Seunghun Han
-
Low Cost Open Source Spectrum Monitoring
- Dominic Spill
-
I Got 99 Trends And A # Is All Of Them! How We Found
Over 100 RCE Vulnerabilities In Trend Micro Software
- Steven Seeley and Roberto Suggi Liverani
-
Most Impressive:
A Guide To Key Impressioning Attacks
- Jos Weyers
-
All Fall Down: Interdependencies In The Cloud
- Window Snyder
-
Pwning ARM Debug Components
For Sec-Related Stuff
- Pascal Cotret and Muhammad Abdul Wahab
-
Everybody Wants Some:
Advance Same Origin Method Execution
- Ben Hayak
-
Chasing Cars: Keyless Entry System Attacks
- Yingtao Zeng,Qing Yang and Jun Li
-
Understanding The Microsoft
Office 2016 Protected-View Sandbox
- Koh Yong Chuan
-
Intel DCI Secrets
- Maxim Goryachy and Mark Ermolov
-
Extracting All Your Secrets:
Vulnerabilities In Android Password Managers
- S. Huber,S. Arzt and S. Rasthofer
-
The Best Laid Schemes: Attacking Url Schemes
- Yu Hong
-
Uberbounty:
Bug Bounty From A Program's Perspective
- Rob Fletcher
-
Will It Blend? CISO's And Hackers
- Chris van den Hooven
-
Hunting For Vulnerabilities In Signal
- Markus Vervier
-
An Attack-In-Depth Analysis Of
Multicast DNS And DNS Service Discovery
- Antonios Atlasis
-
IoT Hacking Simplified
- Aseem Jakhar
-
A Surprise Encounter With A Telco APT
- Emmanuel 'EMX' Gadaix
-
Oversight: Exposing Spies On MacOs
- Patrick Wardle
-
Bypassing Memory Mitigations Using
Data-Only Exploitation Techniques (Part II)
- Bing Sun and Chong Xu
-
Unauthorized Erlang: A Demonstration
- Don Bailey
-
How To Make A Magic Mirror
- Steven Wierckx
-
Heads Up: Bootstrapping
Systems With Open Source Firmware
- Trammell Hudson
-
Is There A Doctor In The House? Hacking
Medical Devices And Healthcare Infrastructure
- Anirudh Duggal
-
The ECMA And The Chakra
- Natalie Silvanovich
-
Closing Ceremony
- HitB Crew