0-days & Mitigations: Roadways to Exploit and Secure Connected BMW Cars
100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans
A Compendium of Container Escapes
A Decade After Bleichenbacher '06, RSA Signature Forgery Still Works
Adventures in the Underland: The CQForensic Toolkit as a Unique Weapon Against Hackers
All the 4G Modules Could be Hacked
All Your Apple are Belong to Us: Unique Identification and Cross-Device Tracking of Apple Devices
APIC's Adventures in Wonderland
API-Induced SSRF: How Apple Pay Scattered Vulnerabilities Across the Web
Arm IDA and Cross Check: Reversing the Boeing 787's Core Network
Attacking and Defending the Microsoft Cloud (Office 365 & Azure AD)
Attacking Electric Motors for Fun and Profit
Attacking iPhone XS Max
Attack Surface as a Service
Automation Techniques in C++ Reverse Engineering
Backdooring Hardware Devices by Injecting Malicious Payloads on Microcontrollers
Battle of Windows Service: A Silver Bullet to Discover File Privilege Escalation Bugs Automatically
Behind the Scenes of Intel Security and Manageability Engine
Behind the scenes of iOS and Mac Security
Behind the Scenes: The Industry of Social Media Manipulation Driven by Malware
Biometric Authentication Under Threat: Liveness Detection Hacking
Bounty Operations: Best Practices and Common Pitfalls to Avoid in the First 6-12 Months
Breaking Encrypted Databases: Generic Attacks on Range Queries
Breaking Samsung's ARM TrustZone
Breaking Through Another Side: Bypassing Firmware Security Boundaries from Embedded Controller
Bypassing the Maginot Line: Remotely Exploit the Hardware Decoder on Smartphone
Chip.Fail - Glitching the Silicon of the Connected World
ClickOnce and You're in - When Appref-ms Abuse is Operating as Intended
Come Join the CAFSA - Continuous Automated Firmware Security Analysis
Command Injection in F5 iRules
Controlled Chaos: The Inevitable Marriage of DevOps & Security
Critical Zero Days Remotely Compromise the Most Popular Real-Time OS
Cyber Insurance 101 for CISO’s
Cybersecurity Risk Assessment for Safety-Critical Systems
Death to the IOC: What's Next in Threat Intelligence
Debug for Bug: Crack and Hack Apple Core by Itself - Fun and Profit to Debug and Fuzz Apple Kernel by lldb Script
Deconstructing the Phishing Campaigns that Target Gmail Users
Defense Against Rapidly Morphing DDOS
Denial of Service with a Fistful of Packets: Exploiting Algorithmic Complexity Vulnerabilities
Detecting Deep Fakes with Mice
Detecting Malicious Files with YARA Rules as They Traverse the Network
DevSecOps : What, Why and How
Dragonblood: Attacking the Dragonfly Handshake of WPA3
Everybody be Cool, This is a Robbery!
Every Security Team is a Software Team Now
Exploiting Qualcomm WLAN and Modem Over The Air
Exploiting the Hyper-V IDE Emulator to Escape the Virtual Machine
Exploring the New World : Remote Exploitation of SQLite and Curl
Fantastic Red-Team Attacks and How to Find Them
Finding a Needle in an Encrypted Haystack: Leveraging Cryptographic Abilities to Detect the Most Prevalent Attacks on Active Directory
Finding Our Path: How We're Trying to Improve Active Directory Security
Firmware Cartography: Charting the Course for Modern Server Compromise
Flying a False Flag: Advanced C2, Trust Conflicts, and Domain Takeover
GDPArrrrr: Using Privacy Laws to Steal Identities
Ghidra - Journey from Classified NSA Tool to Open Source
Going Beyond Coverage-Guided Fuzzing with Structured Fuzzing
Hacking for the Greater Good: Empowering Technologists to Strengthen Digital Society
Hacking Ten Million Useful Idiots: Online Propaganda as a Socio-Technical Security Project
Hacking Your Non-Compete
He Said, She Said – Poisoned RDP Offense and Defense
HostSplit: Exploitable Antipatterns in Unicode Normalization
How Do Cyber Insurers View The World?
How to Detect that Your Domains are Being Abused for Phishing by Using DNS
HTTP Desync Attacks: Smashing into the Cell Next Door
Hunting for Bugs, Catching Dragons
I'm Unique, Just Like You: Human Side-Channels and Their Implications for Security and Privacy
Infighting Among Russian Security Services in the Cyber Sphere
Infiltrating Corporate Intranet Like NSA - Pre-auth RCE on Leading SSL VPNs
Information Security in the Public Interest
Inside the Apple T2
Integration of Cyber Insurance Into A Risk Management Program
Internet-Scale Analysis of AWS Cognito Security
It's Not What You Know, It's What You Do: How Data Can Shape Security Engagement
Legal GNSS Spoofing and its Effects on Autonomous Vehicles
Lessons and Lulz: The 5th Annual Black Hat USA NOC Report
Lessons From Two Years of Crypto Audits
Look, No Hands! -- The Remote, Interaction-less Attack Surface of the iPhone
Making Big Things Better the Dead Cow Way
Managing for Success: Maintaining a Healthy Bug Bounty Program Long Term
Messaging Layer Security: Towards a New Era of Secure Group Messaging
MINimum Failure - Stealing Bitcoins with Electromagnetic Fault Injection
MITRE ATT&CK: The Play at Home Edition
Mobile Interconnect Threats: How Next-Gen Products May be Already Outdated
Monsters in the Middleboxes: Building Tools for Detecting HTTPS Interception
Moving from Hacking IoT Gadgets to Breaking into One of Europe's Highest Hotel Suites
New Vulnerabilities in 5G Networks
On Trust: Stories from the Front Lines
Operational Templates for State-Level Attack and Collective Defense of Countries
Paging All Windows Geeks – Finding Evil in Windows 10 Compressed Memory
PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary
PicoDMA: DMA Attacks at Your Fingertips
Planning a Bug Bounty: The Nuts and Bolts from Concept to Launch
Playing Offense and Defense with Deepfakes
Practical Approach to Automate the Discovery and Eradication of Open-Source Software Vulnerabilities at Scale
Predictive Vulnerability Scoring System
Preventing Authentication Bypass: A Tale of Two Researchers
Process Injection Techniques - Gotta Catch Them All
Project Zero: Five Years of "Make 0Day Hard"
Responding to a Cyber Attack with Missiles
Reverse Engineering WhatsApp Encryption for Chat Manipulation and More
Rogue7: Rogue Engineering-Station Attacks on S7 Simatic PLCs
Rough and Ready: Frameworks to Measure Persistent Engagement and Deterrence
Securing Apps in the Open-By-Default Cloud
Securing the System: A Deep Dive into Reversing Android Pre-Installed Apps
Selling 0-Days to Governments and Offensive Security Companies
Sensor and Process Fingerprinting in Industrial Control Systems
Shifting Knowledge Left: Keeping up with Modern Application Security
SSO Wars: The Token Menace
Testing Your Organization's Social Media Awareness
The Cyber Shell Game – War, Information Warfare, and the Darkening Web
The Discovery of a Government Malware and an Unexpected Spy Scandal
The Enemy Within: Modern Supply Chain Attacks
The Future of ATO
The Future of Securing Intelligent Electronic Devices Using the IEC 62351-7 Standard for Monitoring
The Most Secure Browser? Pwning Chrome from 2016 to 2019
The Path Less Traveled: Abusing Kubernetes Defaults
Towards Discovering Remote Code Execution Vulnerabilities in Apple FaceTime
Transparency in the Software Supply Chain: Making SBOM a Reality
WebAuthn 101 - Demystifying WebAuthn
Woke Hiring Won't Save Us: An Actionable Approach to Diversity Hiring and Retention
Women in Security: Building a Female InfoSec Community in Korea, Japan, and Taiwan
Worm Charming: Harvesting Malware Lures for Fun and Profit
Zombie Ant Farming: Practical Tips for Playing Hide and Seek with Linux EDRs