-
AI Security: Why, What, How?
- Alexander Polyakov
-
Right The First Time:
Modular PCB Design For Makers
- Brita Meriac
-
New Threats Are Already Around You,
The IPV6 Attack Must Be Understood
- Jie Fu and KunZhe Chai & YongTao Wang
-
AI For Security Or Security For AI?
- Sergey Gordeychik
-
Hacking The 0day Market
- Andrea Zapparoli Manzoni
-
Discover Invisible Fileless
Webshell In The APT Attack
- Tim Yeh & Dove Chiu
-
Practical Approaches For Testing
And Breaking JWT Authentication
- Mazin Ahmed
-
Docker Container (In)Security
- Suraj Khetani
-
Securing Your Laptop Like You *Mean* It:
Virtualization Based Security
- Milosch Meriac
-
Transferability Of Adversarial Examples
To Attack Real World Porn Image Detection
- Dou Goodman. Wang Yang and Hao Xin
-
On The Wings Of Time: Demystifying
Wireless Ethical Hacking And Defenses
- Harshit Agrawal & Himanshu Mehta
-
Looking Through Muddy Waters: Insight Into
TTPs Of A Middle Eastern Threat Actor
- Jaromir Horejsi
-
Building A GEN2 UHF RFID Reader With SDR
- Adam Laurie
-
Call Of Duty: Modern Browser Warfare
- Dhiraj Mishra
-
Physics Of Security
- Tomas Drab
-
Hack In, Cash Out. Adventures In
The World Of Transaction Fraud
- Tim Yunosov
-
Power Line Communication
Security On Smart Grids
- Fatih Kayran
-
IoT Pentesting The Right Way
- Yogesh Ojha
-
Welcome Address
- Dhillon 'L33tdawg' Kannabhiran
-
Security Is Already Here...
It’s Just Not Evenly Distributed Yet
- Chris Wysopal
-
Debunking Fault Injection
Myths And Misconceptions
- Cristofaro Mune and Niek Timmers
-
SOCMINT – Hunting Threats
In Social Media Networks
- Fyodor Yarochkin and Vladimir Kropotov
-
Government At The Center Of A Cyber Battle
- H.E. Mohammed Gheyath
-
Are You Insured Around Cyber Crime?
- Jake Kouns
-
Fuzzing Farm Monoculture Antipatterns:
Are We Finding The Same Bugs?
- Marc Schoenefeld
-
Build A Quantum Computer
At Home – Hacker Style!
- Yann Allain
-
Cloud Computing's Appeal Is
Cloud Security's Complexity
- Nils Puhlmann
-
Quantum Disruption
- Jose Ignacio
-
Car Hacking: Practical Guide
To Automotive Security
- Yogesh Ojha
-
What Would A Quantum Computer Do To Crypto
- Najwa Aaraj
-
Quantum Panel Discussion
- Marc Manzano,Yann Allain,Najwa Aaraj and Jose Ignacio
-
DCART: Decoupled Components
For Automated Ransomware Testing
- Mark Mager
-
We Hacked The Planet - Now What?
- Katie Moussouris
-
Introducing ARM-X:
The ARM IoT Firmware Emulation Framework
- Saumil Shah
-
CyptoAPT: APT Attacks On
Crypto Exchange Employees
- Heungsoo Kang
-
ABBE: Detecting Attacks In
Ethereum Smart Contracts
- Nguyen Quoc Bao and Nguyen Anh Quynh
-
The Sum Of All Fears,
When ICS/SCADA Are Compromised
- Mars Cheng
-
The Impact Of Blockchain And Cryptocurrencies
On Governments Around The World
- Gerard Dache
-
EOS: Hackers New Bank
- Vic Huang
-
BCM – Secure Messaging By Hackers For Hackers
- KunZhe Chai
-
Blockchain-Security Symbiosis: Security Enabling
Blockchains; Blockchains Enabling Security
- Paul Makowski
-
Reimplementing Local RPC In .Net
- James Forshaw
-
Hackers And Cyberwar: How Hacking
Has Changed The Modern Battlefield
- Marc Rogers
-
Scapula: An Open-Source Toolkit For Model-
Based Fuzzing And Verification Of ARM CPUs
- Jared Wright
-
The Road To Building Defendable Systems
- Saumil Shah
-
Practical LoRaWAN Auditing And Exploitation
- Esteban Martínez Fayó,Matías Sequeira and Cesar Cerrudo
-
RIDL: Rogue In Flight Data Load
- Stephan van Schaik,Alyssa Milburn,Pietro Frigo and Sebastian Osterlund
-
Advances In The Trinity Of AI:
Data, Algorithms & Compute Infrastructure
- Anima Anandkumar
-
Ridiculous Radios
- Michael Ossmann
-
Reputation Systems Against Social Engineering
And Manipulation In Online Environments
- Anton Kolonin
-
Open Source Security – Vulnerabilities Never Come Alone
- Fermin J. Serna