-
Myths And Realities Of Attribution Manipulation
- Félix Aimé and Ronan Mouchoux
-
Snuffleupagus:
Killing Bugclasses In PHP 7, Virtual-Patching The Rest
- Sébastien Blot,Thibault Koechlin and Julien Voisin
-
Randori, A Low Interaction Honeypot With A Vengeance
- Bouke van Laethem
-
Queer Privacy & Building Consensual Systems
- Sarah Jamie Lewis
-
Secure Physical Data Destruction
- Johan Huurman
-
Gigatron DIY TTL Computer
- Walter Belgers
-
Peerlyst 3 Years In
- Claus Houmann
-
ManaTI: Web Assistance For The Threat Analyst,
Supported By Domain Similarity
- Raúl B. Netto
-
Let's Play with WinDBG & .NET
- Paul Rascagneres
-
Device Sensors Meet The Web:
A Story Of Sadness And Regret
- Lukasz Olejnik
-
Malicious Use Of Microsoft
'Local Administrator Password Solution'
- Maxime Clementz and Antoine Goichot
-
The Bicho: An Advanced Car Backdoor Maker
- Sheila Ayelen Berta and Claudio Caracciolo
-
Countering Security Threats By Sharing Information:
Emerging Civil Society Practices
- Becky Kazansky
-
Intel AMT: Using & Abusing The Ghost In The Machine
- Parth Shukla
-
The Struggle: Dealing With Language Designers
And Maintainers On Proper Use Of CSPRNGs
- Aaron Zauner
-
Keynterceptor:
Press Any Key To Continue
- Niels van Dijkhuizen
-
A View Into ALPC-RPC
- Clement Rouault and Thomas Imbert
-
The Untold Stories Of Hackers In Detention
- Azet and JTK
-
Infosec And Failure
- Ange Albertini
-
Fancy Remediation Tracking Tool
- Daniel Nguyen
-
Finding The Bad Guys
- Eric Leblond
-
Sigma - Generic Signatures For Log Events
- Thomas Patzke
-
SMT Solvers In The IT Security:
Deobfuscating Binary Code With Logic
- Thaís Moreira Hamasaki
-
Network Automation Is Not Your Safe Haven: Protocol
Analysis And Vulnerabilities Of Autonomic Network
- Omar Eissa
-
API Design For Cryptography
- Frank Denis
-
WTFrance?!
Cryptography And Legislation In France
- Okhin
-
In Soviet Russia, Vulnerability Finds You
- Inbar Raz
-
Hospitals And Infosec: The Consequences
Of Bad Security In Health Care
- Jelena Milosevic
-
How I've Broken Every Threat Intel Platform
I've Ever Had (And Settled on MISP)
- John Bambenek
-
Automation Attacks At Scale
- Will Glazier and Mayank Dhiman
-
Front Door Nightmares. When Smart Is Not Secure
- ObiWan666
-
What Is The Max Reflected Distributed
Denial Of Service (rDDoS) Potential Of IPv4?
- Éireann Leverett and Aaron Kaplan
-
Information Flows And Leaks In Social Media
- Vladimir Kropotov and Fyodor Yarochkin
-
RetDec: An Open-Source Machine-Code Decompiler
- Peter Matula
-
Things That Go Bump In The Night
- Janusz Urbanowicz
-
Twitter Settings
- Aaron K
-
On Strategy
- Eleanor Saitta
-
Digital Vengeance:
Exploiting Notorious C&C Toolkits
- Waylon Grange
-
Are Your VoLTE And VoWiFi Calls Secure?
- Sreepriya Chalakkal
-
Bug Hunting Using Symbolic Virtual Machines!
- Anto Joseph
-
Vulnerability Disclosure, Governments And You
- Jeroen van der Ham
-
TIDS: A Framework For Detecting
Threats In Telecom Networks
- Alexandre De Oliveira and Cu D. Nguyen
-
Applying Bug Hunters Methodologies To
Your Organisation, Lessons From The Field
- Paul Amar