-
Stressed Out?
Denial Of Service Attacks From The Providers' Perspective
- Alice Hutchings
-
Metabrik Meets CVE-Search by GomoR
- GomoR
-
When Your Firewall Turns Against You
- Rene Freingruber
-
Cracking An Egg And Cooking The Chicken
- Jacob I. Torrey
-
Exploiting And Attacking Seismological Networks Remotely
- Bertin Bervis Bonilla and James Jara
-
HIDden Secrets In Soft Token:
A Security Study Of HID Global Soft Token
- Mouad Abouhali
-
KillTheHashes 30 Million Malware DNA Profiling Exercise
- Luciano Martins,Rodrigo Cetera and Javier Bassi
-
Unveiling The Attack Chain Of
Russian-Speaking Cybercriminals
- Wayne Huang and Sun Huang
-
Of Mice And Keyboards:
On The Security Of Modern Wireless Desktop Sets
- Matthias Deeg and Gerhard Klostermeier
-
Windows Systems & Code Signing Protection
- Paul Rascagnères
-
Cyber Grand Shellphish:
Shellphish And The DARPA Cyber Grand Challenge
- Kevin Borgolte
-
The Metabrik Platform:
Rapid Development Of Reusable Security Tools
- Patrice Auffret
-
2016: The Infosec Crossroads
- Saumil Shah
-
Exploit Generation And JavaScript
Analysis Automation With WinDBG
- Fitzl Csaba and Miklos Desbordes-Korcsev
-
A Network Of Sorrows:
Small Adversaries And Small Allies
- Quinn Norton
-
Start-up Pitch: securityscorecard.io
- Chris Meidinger
-
Start-up Pitch: redowl.com
- Peter Heim
-
Sisyphe, All IP Data In One Place
- GomoR
-
Exploiting New Default Accounts In SAP Systems
- Joris Van De Vis
-
badGPO - Using GPOs For
Persistence And Lateral Movement
- Yves Kraft and Immanuel Willi
-
Machine Duping:
Pwning Deep Learning Systems
- Clarence Chio
-
Credential Assessment:
Mapping Privilege Escalation At Scale
- Matt Weeks
-
When Crypto Fails
- Yaniv Balmas and Ben Herzog
-
Bootstrapping An Architectural Research Platform
- Jacob I. Torrey
-
Hadoop Safari:
Hunting For Vulnerabilities
- Thomas Debize and Mahdi Braik
-
Illusions And Reality Of CERT Business
- Sascha Rommelfangen
-
0Patch: Be Your Own Software Doctor
- Mitja Kolsek
-
BtleJuice: The Bluetooth Smart Man In The Middle Framework
- Damien Cauquil
-
Where Should I Host My Malware?
- Attila Marosi
-
Interesting Malware - No, I'm Not kidding
- Marion Marschalek
-
Enhancing Infrastructure Cybersecurity In Europe
- Rossella Mattioli
-
Lama Project
- Valentin Giannini
-
Geeks Without Bounds
- Chris Kebecka
-
Hardware Shredder
- Stefan Chorus
-
iOS Forensics
- Pasquale Stirparo
-
EmailMadeIn.lu
- Martin Bosslet
-
House Intercoms Attacks:
When Frontdoors Become Backdoors
- Sébastien Dudek
-
When Practice Informs Technology
- Mahsa Alimardani
-
Bridging Political Gaps With Code
- Okhin
-
WiFi Exploitation:
How Passive Interception Leads To Active Exploitation
- Solomon Sonya
-
Fraud Detection And Forensics On Telco Networks
- Vladimir Kropotov and Dmitry Kurbatov
-
The Legend Of Windows: A Link To The Hash
- m4xk and sıx
-
CTF Prize Ceremony
- Fluxfingers