-
Take Or Buy
- Michael Hausding
-
Abusing Android In-app Billing feature
- Jérémy Matos
-
How To Adapt The SDLC For DevSecOps
- Zane Lackey
-
GLibC Malloc for Exploiters:
Leak It, Write It, Become a Wizard
- Yannay Livneh
-
SAP Incident Response, Real Life
Examples On How To Attack And Defend
- Jordan Santarsieri
-
Reducing The Cyber Exposure Gap
From Cloud To Containers
- Thomas Cueni
-
Microarchitectural Attacks And
The Case Of Meltdown And Spectre
- Daniel Gruss
-
Security By Design: Reality Vs Expectations
- Julien Patriarca
-
Unmasking Stealth Operations
Using UBA Super Powers
- Snir Ben-Shimol
-
Quantum Cyber Blockchain IoT
- JP Aumasson
-
Threats Of Tomorrow: Using Artificial Intelligence
To Predict Malicious Infrastructure Activity
- Staffan Truvé
-
A Brief History Of CTF
- Jordan Wiens
-
Hijacking The Boot Process - Ransomware Style
- Raul Alvarez
-
DPAPI And DPAPI-NG: Decrypting All
Users' Secrets And PFX Passwords
- Paula Januszkewicz
-
Battle Of The Smarts:
Hacking Smartphones With Bluetooth Smart
- Tal Melamed
-
A Walk With Shannon: A Walkthrough
Of A Pwn2Own Baseband Exploit
- Amat Cama
-
How To build Least Privilege Security Architecture
For Virtualization And Cloud Environments
- Ghaleb Zekri
-
Ph0wn Smart Devices CTF: Behind The Scenes
- Axelle Apvrille and Philippe Paget
-
Attacking .NET Deserialization
- Alvaro Muñoz
-
Email SPFoofing: Modern Email Security
Features And How To Break Them
- Roberto Clapis
-
Maximize The Power Of Hex-Rays Decompiler
- Igor Kirillov