-
I Fight For The Users! The Prequel
- Erin Jacobs
-
Stumping The Mobile Chipset:
Taxonomy Of New 0-Day Exploits For Android
- Adam Donenfeld
-
Understanding Your Opponent:
Attack Profiling
- Moonbeom Park and Yongjun Park
-
Attacking Nvidia's Tegra Platform:
Hacking Your Smart Phones, Tablets And Cars
- Peter Pi
-
Data Driven Software Security
- Sweety Chauhan
-
Attacking Software Tokens
- Bernhard Mueller
-
Halycon – An IDE For Faster
Nmap Scripting Engine Development
- Sanoop Thomas
-
The Apple Sandbox:
Deeper Into The Quagmire
- Jonathan Levin
-
Reverse Engineering Swift Applications
- Michael Gianarakis
-
Fuzzer Development For Mere Mortals
- Mohammed A. Imran
-
Keystone: A Next Generation Assembler Framework
- Nguyen Anh Quynh
-
Trust No One
ATMs And Their Dirty Little Secrets
- Olga Kochetova and Alexey Osipov
-
Hacking The Pentagon: Bounty Creation Lessons
From The Bug Bounty Bene Gesserit Reverend Mother
- Katie Moussouris
-
Fuzzing The Windows Kernel
- Koh Yong Chuan
-
(Ab)Using Smart Cities:
The Dark Age Of Modern Mobility
- Matteo Beccaro and Matteo Collura
-
Copy-Paste Vulnerabilities
- Vanessa Henderson
-
Cofi Break: Breaking Exploits With
Practical Control Flow Integrity
- Shlomi Oberman Ron Shina
-
Forensic Analysis And Assessment
Of Android Banking Apps
- Rajchada Chanajitt
-
Fake President Fraud Defrauded
- Florian Lukavsky
-
iOS 10 Kernel Heap Revisited
- Stefan Esser
-
Vulnerabilities And Ethics:
A Code Of Ethics For The Private Sector
- Alfonso De Gregorio
-
IoT Honeypots
- Tan Kean Siong
-
Look Mom! I Don't Use Shellcode: A Browser
Exploitation Case Study For Internet Explorer 11
- Moritz Jodeit
-
Local Privilege Escalation In 2016
- Paul Craig
-
Hacking In Song:
Cautionary Musical Stories From The Command Line
- Fabienne Serriere
-
CTF Prize Giving / Closing Note
- HitB Crew