-
Blackshield Awards
-
-
NULL Community Talk
-
-
The Mirai BotNet And Where DDoS Attacks Are Headed
- Ben Herzberg
-
Case Study On RFID (Proximity Cards) Hacking
- Sarwar Jahan and Ashwath Kumar
-
Hackers! Do We Shoot Or Do We Hug?
- Edwin Van Andel
-
Opening Note
-
-
Silicon: Security's New Layer
- Joshua Pennel
-
Antivirus Evasion Reconstructed - Veil 3.0
- Christopher Truncer
-
How To Be Successful In The Azure Bug Bounty
- Michael Hendrickx
-
Digital Warriors: India And The
Future Of Conflict On The Internet
- CXO Panel
-
Invoke-Obfuscation: PowerShell obFUsk8tion
Techniques And How To (Try To) D""e`Tec`T 'Th'+'em'
- Daniel Bohannon
-
Increasing Your Impact On Facebook Bug Bounty
- Jack Whitton
-
Breach Response
Time To Shake Up The Status Quo
- CXO Panel
-
Nearly generic fuzzing of XML-based formats
- Nicolas Gregoire
-
Great Bugs In Google VRP In 2016
- Martin Straka and Karshan Sharma
-
Securing Critical National Infrastructure
- CXO Panel
-
Drone Hijacking and other IoT
hacking with GNU Radio and SDR
- Arthur Garipov
-
How To Interact With Bug Bounty Programs
- Faraz
-
Barbarians At The Gate(way)
- Dave Lewis
-
Bug Bounty Reports - How Do they Work
- Adam Bacchus
-
Hardware Security:
Foundational Block Of Cyber Battlefield
- CXO Panel
-
Hackers InSight
-
-
When Enough Is Enough:
The Limits Of Desirable Security
- Karsten Nohl
-
Training Machines For Application Scanning In Retro Style
- Bharadwaj Machiraju
-
Hypervisors In Your Toolbox: Monitoring And
Controlling System Events With HyperPlatform
- Satoshi Tanda & Timo Kreuzer
-
Cyber Security Blueprint For A Future
- CXO Panel
-
Explorer's Guide To Shooting Satellite Transponders
- Jay Turla
-
Case Study Of SS7/Sigtran Assessment
- Akib Sayyed
-
Application Security Opportunities
And Challenges In A DevOps World
- CXO Panel
-
Hacking Medical Devices And Infrastructure
- Anirudh Duggal
-
7 Sins Of ATM Protection Against Logical Attacks
- Timur Yunusov
-
DevOpSec: Rapid Security In The Cloud With AWS And CIS
- Mikhail Advani and Rajesh Tamhane
-
Blockchain And Security : Bank And Insurance Applications
- Renaud Lifchitz
-
The Art Of Bootloader Unlocking: Exploiting Samsung Sboot
- Nitay Artenstein
-
Engineering Better Security At Facebook
- Karen Sittig
-
Injecting Security Into Web Apps With
Runtime Patching And Context Learning
- Ajin Abraham
-
p≡p ≡ pretty Easy privacy:
Making Privacy The Default For Everyone
- SVA