-
The End Is The Beginning Is The End:
Ten Years In The NL Box
- Dhillon 'L33tdawg' Kannabhiran
-
Make ARM Shellcode Great Again
- Saumil Shah
-
Hourglass Fuzz: A Quick Bug Hunting Method
- Moony Li,Todd Han,Lance Jiang and Lilang Wu
-
Wireless Hacking With HackCUBE-Special
- Jie Fu and Kunzhe Chai
-
Hacking The 0day Market
- Andrea Zapparoli Manzoni
-
Now You See It:
TOCTOU Attacks Against Secure Boot And BootGuard
- Trammell Hudson and Peter Bosch
-
Hidden Agendas:
Bypassing GSMA Recommendations On SS7 Networks
- Kirill Puzankov
-
WiCy: Monitoring 802.11AC Networks At Scale
- Vivek Ramachandran
-
This Is A Public Service Announcement:
Hacking LTE Public Warning Systems
- Weiguang Li
-
i.MX Memory Madness: How To Dump, Parse, And Analyze i.MX Flash Memory Chips
- Damien Cauquil
-
Mbuf-oflow: Finding Vulnerabilities
In iOS/MacOS Networking Code
- Kevin Backhouse
-
Fn_fuzzy:
Fast Multiple Binary Diffing Triage With IDA
- Takahiro Haruyama
-
V1 Bounty: Building An International Coordinated
Bug Disclosure Bridge For The European Union
- Benjamin Kunz
-
Social Networks: Can We Fix Them?
- Joel Hernandez
-
Overcoming Fear: Reversing With Radare2
- Arnau Gamez Montolio
-
The Birdman: Hacking Cospas-Sarsat Satellites
- Hao Jingli
-
GDALR:
Duplicating Black Box Machine Learning Models
- Rewanth Cool and Nikhil Joshi
-
Ghost Tunnel 2.0: Blue Ghost
- Yongtao Wang
-
Hiding A Secret Distributed Chat System
Inside 802.11 Management Frames
- Yago Hansen
-
Modern Techniques To Deobfuscate
UEFI/BIOS Malware And Virtualized Packers
- Alexandre Borges
-
Fresh Apples:
Researching New Attack Interfaces On iOS And OSX
- Lilang Wu and Moony Li
-
VoLTE Phreaking
- Ralph Moonen
-
Infrared: Old Threat Meets New Devices
- Wang Kang
-
Attacking GSM - Alarms, Smart Homes, Smart Watches And More
- Alex Kolchanov
-
Content Security Policy:
A Successful Mess Between Hardening And Mitigation
- Lukas Weichselbaum and Michele Spagnuolo
-
For The Win:
The Art Of The Windows Kernel Fuzzing
- Guangming Liu
-
A Decade Of Infosec Tools
- Thomas Debize
-
SeasCoASA: Exploiting A Small Leak In A Great Ship
- Kaiyi Xu and Lily Tang
-
H(ack)DMI: Pwning HDMI For Fun And Profit
- Jeonghoon Shin and Changhyeon Moon
-
Pwning Centrally-Controlled Smart Homes:
It's A Gas
- Sanghyun Park and Seongjoon Cho
-
Automated Discovery Of Logical
Privilege Escalation Bugs In Windows 10
- Wenxu Wu and Shi Qin
-
GSEC Lucky Draw:
Win A Trip To Singapore
- Cherry
-
Securing Journalists
- Runa Sandvik
-
Hey Attacker! I Can See You!
- Ross Bevington
-
Compiler Bugs And Bug Compilers
- Marion Marschalek
-
Deep Confusables: Improving Unicode
Encoding Attacks With Deep Learning
- Alfonso Muñoz,Miguel H. Boza and José I. Escribano
-
Rise Of The WarPi
- Kevin McPeake
-
Attacking Encrypted VOIP Protocols
- Ivica Stipovic
-
Muraena: The Unexpected Phish
- Michele Orru and Giuseppe Trotta
-
Reversing Cryptographic Primitives
Using Quantum Computing
- Renaud Lifchitz
-
PatrOwl - The Red Flavour Of
SOC Automation And Orchestration
- Nicolas Mattiocco
-
Implementation And Evaluation Of Secure And
Scalable Anomaly-Based Network Intrusion Detection
- Philipp Mieden
-
Hacking Jenkins
- Orange Tsai
-
Binder: The Bridge To Root
- Hongli Han and Mingjian Zhou
-
RF Exploitation:
Demystifying IoT/OT Hacks With SDR
- Harshit Agrawal and Himanshu Mehta
-
Reverse Engineering Custom ASICs By
Exploiting Potential Supply-Chain Leaks
- Thomas Weber
-
Sneaking Past Device Guard
- Philip Tsukerman
-
ModJack: Hijacking The MacOS Kernel
- Zhi Zhou
-
I Own Your Building (Management System)
- Gjoko Krstic
-
Reversing Mobile Malware
- Abdullah Joseph
-
Hey Operator, Where's Your Crane?
Attacking Industrial Remote Controllers
- Marco Balduzzi and Federico Maggi
-
Panic On The Streets Of Amsterdam: PanicXNU 3.0
- Juwei Lin and Junzhi Lu
-
Might As Well JUMP:
Exploit Development For Java Serialization
- Jameel Nabbo
-
The Beginning Of The End?
A Return To The Abyss For A Quick Look
- Richard Thieme
-
Closing Ceremony
- HitB Crew
-
Locknote
- Dhillon 'L33tdawg' Kannabhiran