-
IoT - A Security Hole Without A Patch
- Earl Carter
-
Finding Vulnerabilities And Malware
In Open-Source Code At Scale
- Mark Curphey
-
A Deep Dive Into The Digital Weapons
Of The North Korean Cyber Army
- Ashley Shen and Moonbeom Park
-
Hadoop Safari: Hunting For Vulnerabilities
- Thomas Debize and Mahdi Braik
-
Spy Vs. Spy:
A Modern Study Of Microphone Bugs
- Veronica Valeros and Sebastian Garcia
-
Insecurity In 2017:
0-Days Are The Least Of Our Problems
- Nick Biasini
-
A Year In The Red
- Dominic Chell and Vincent Yiu
-
Autosec: Automotive Security Assessment Techniques
And Tools From A Pentester's Perspective
- Keisuke Hirata
-
Pwnrensics: How To Execute Code
On A Forensic Workstation
- Florian Lukavsky and Wolfgang Ettlinger
-
Get To The Money:
Hacking PoS And PoP Systems
- Dmitry Chastuhin and Vladimir Egorov
-
Hacking Robots Before Skynet
- Lucas Apa and Cesar Cerrudo
-
Mythbusters: CVE-2017-5689
How We Broke Intel Amt
- Alexander Ermolov,Dmitriy Evdokimov and Maksim Malyutin
-
Threat Hunting 101: Become The Hunter
- Hamza Beghal
-
A New Era Of SSRF - Exploiting Url
Parsers In Trending Programming Languages
- Orange Tsai
-
The Original Elevat0r
History Of A Private Jailbreak
- Stefan Esser
-
Smart City / Smart Nation Panel Discussion
- Mark Curphey,Cesar Cerrudo,Eddie Schwartz and Matteo Beccaro
-
The State Of Cyber: How Stealthier Attacks Are
Blurring The Lines Between Cybercrime And Statecraft
- George Kurtz
-
Searching For A Needle In A Remote Haystack
- Vitaly Kamluk and Wayne Lee
-
XFLTReaT: A New Dimension In Tunnelling
- Balazs Bucsay
-
It's Friday Evening Professor Moriarty
- Nicolas Collery
-
Applying Intelligence And Counterintelligence
Techniques To Cyber Network Operations
- Joseph Hesse and Kamal Ranjan
-
Ro(o)tten Apples:
Vulnerability Heaven In The iOS Sandbox
- Adam Donenfeld
-
Facebook: The Deep & Dark Web
For Threat Actors In Asia
- Fadli B. Sidek
-
Neuralfuzz:
Neural Networks For Fuzzing Web Apps
- Ivan Novikov
-
2FAssassin:
Bypass 2FA, Stealing Private Keys, And More
- Maxwell Koh
-
Stealing PLC Intellectual Property:
A Red Teaming Story
- Matteo Beccaro
-
QEMU Attack Surface And Security Internals
- Qiang Li and ZhiBin Hu
-
Unstructured Data Is The New Gold:
ML + NLP Is The New Shiz!
- Jim Geovedi
-
Security Crowdsourcing: Growing Network
Security Specialists For The Enterprise
- Xinhua Cai
-
Radio Exploitation 101: Characterizing, Contextualizing,
And Applying Wireless Attack Methods
- Matt Knight and Marc Newlin
-
A Case Study Of 200+
Vulnerabilities In Android Phones
- Bai Guangdong and Zhang Qing
-
A Spin Around The Block:
13 Years Of Infosec Challenges
- Kelly Lum