BADUSB - ON ACCESSORIES THAT TURN EVIL
EPIDEMIOLOGY OF SOFTWARE VULNERABILITIES: A STUDY OF ATTACK SURFACE SPREAD
IT JUST (NET)WORKS: THE TRUTH ABOUT IOS 7'S MULTIPEER CONNECTIVITY FRAMEWORK
REVERSE-ENGINEERING THE SUPRA IBOX: EXPLOITATION OF A HARDENED MSP430-BASED DEVICE
WRITE ONCE, PWN ANYWHERE
STAY OUT OF THE KITCHEN: A DLP SECURITY BAKE-OFF
I KNOW YOUR FILTERING POLICY BETTER THAN YOU DO: EXTERNAL ENUMERATION AND EXPLOITATION OF EMAIL AND WEB SECURITY SOLUTIONS
THE NEW SCOURGE OF RANSOMWARE: A STUDY OF CRYPTOLOCKER AND ITS FRIENDS
HOW SMARTCARD PAYMENT SYSTEMS FAIL
MOBILE SECURITY ROUNDTABLE: WHAT DOES MOBILE SECURITY LOOK LIKE TODAY? WHAT WILL IT LOOK LIKE TOMORROW?
ONE PACKER TO RULE THEM ALL: EMPIRICAL IDENTIFICATION, COMPARISON, AND CIRCUMVENTION OF CURRENT ANTIVIRUS DETECTION TECHNIQUES
ABUSE OF CPE DEVICES AND RECOMMENDED FIXES
BUILDING SAFE SYSTEMS AT SCALE - LESSONS FROM SIX MONTHS AT YAHOO
SIDEWINDER TARGETED ATTACK AGAINST ANDROID IN THE GOLDEN AGE OF AD LIBS
BITCOIN TRANSACTION MALLEABILITY THEORY IN PRACTICE
ICSCORSAIR: HOW I WILL PWN YOUR ERP THROUGH 4-20 MA CURRENT LOOP
SAVING CYBERSPACE
A PRACTICAL ATTACK AGAINST VDI SOLUTIONS
WHEN THE LIGHTS GO OUT: HACKING CISCO ENERGYWISE
EXTREME PRIVILEGE ESCALATION ON WINDOWS 8/UEFI SYSTEMS
LEVIATHAN: COMMAND AND CONTROL COMMUNICATIONS ON PLANET EARTH
MEDICAL DEVICES ROUNDTABLE: IS THERE A DOCTOR IN THE HOUSE? SECURITY AND PRIVACY IN THE MEDICAL WORLD
THREAT INTELLIGENCE LIBRARY - A NEW REVOLUTIONARY TECHNOLOGY TO ENHANCE THE SOC BATTLE RHYTHM!
MISSION MPOSSIBLE
GRR: FIND ALL THE BADNESS, COLLECT ALL THE THINGS
ABUSING MICROSOFT KERBEROS: SORRY YOU GUYS DON'T GET IT
MORE SHADOW WALKER: THE PROGRESSION OF TLB-SPLITTING ON X86
EXPLOITING UNPATCHED IOS VULNERABILITIES FOR FUN AND PROFIT
RAVAGE - RUNTIME ANALYSIS OF VULNERABILITIES AND GENERATION OF EXPLOITS
INTERNET SCANNING - CURRENT STATE AND LESSONS LEARNED
SMART NEST THERMOSTAT: A SMART SPY IN YOUR HOME
THINKING OUTSIDE THE SANDBOX - VIOLATING TRUST BOUNDARIES IN UNCOMMON WAYS
PRAGMATIC SECURITY AUTOMATION ROUNDTABLE
FROM ATTACKS TO ACTION - BUILDING A USABLE THREAT MODEL TO DRIVE DEFENSIVE CHOICES
48 DIRTY LITTLE SECRETS CRYPTOGRAPHERS DON'T WANT YOU TO KNOW
SVG: EXPLOITING BROWSERS WITHOUT IMAGE PARSING BUGS
MINIATURIZATION
THE DEVIL DOES NOT EXIST - THE ROLE OF DECEPTION IN CYBER
TIME TRIAL: RACING TOWARDS PRACTICAL TIMING ATTACKS
THE STATE OF INCIDENT RESPONSE
"NOBODY IS LISTENING TO YOUR PHONE CALLS." REALLY? A DEBATE AND DISCUSSION ON THE NSA'S ACTIVITIES
BE MEAN TO YOUR CODE ROUNDTABLE: SECURITY IN THE AGE OF CONTINUOUS INTEGRATION & DEPLOYMENT
STATIC DETECTION AND AUTOMATIC EXPLOITATION OF INTENT MESSAGE VULNERABILITIES IN ANDROID APPLICATIONS
SATCOM TERMINALS: HACKING BY AIR, SEA, AND LAND
FINGERPRINTING WEB APPLICATION PLATFORMS BY VARIATIONS IN PNG IMPLEMENTATIONS
WHY YOU NEED TO DETECT MORE THAN PTH
CATCHING MALWARE EN MASSE: DNS AND IP STYLE
LIFECYCLE OF A PHONE FRAUDSTER: EXPOSING FRAUD ACTIVITY FROM RECONNAISSANCE TO TAKEOVER USING GRAPH ANALYSIS AND ACOUSTICAL ANOMALIES
UNDERSTANDING IMSI PRIVACY
A JOURNEY TO PROTECT POINTS-OF-SALE
CALL TO ARMS: A TALE OF THE WEAKNESSES OF CURRENT CLIENT-SIDE XSS FILTERING
SAP, CREDIT CARDS, AND THE BIRD THAT TALKS TOO MUCH
SECURITY AND SOFTWARE DEFINED NETWORKING ROUNDTABLE: NEW EXPOSURES OR NEW OPPORTUNITIES?
INVESTIGATING POWERSHELL ATTACKS
HACKING THE WIRELESS WORLD WITH SOFTWARE DEFINED RADIO - 2.0
UNWRAPPING THE TRUTH: ANALYSIS OF MOBILE APPLICATION WRAPPING SOLUTIONS
CAPSTONE: NEXT GENERATION DISASSEMBLY FRAMEWORK
EXPOSING BOOTKITS WITH BIOS EMULATION
CREATING A SPIDER GOAT: USING TRANSACTIONAL MEMORY SUPPORT FOR SECURITY
UNDERSTANDING TOCTTOU IN THE WINDOWS KERNEL FONT SCALER ENGINE
PROBABILISTIC SPYING ON ENCRYPTED TUNNELS
POACHER TURNED GAMEKEEPER: LESSONS LEARNED FROM EIGHT YEARS OF BREAKING HYPERVISORS
THE NEW PAGE OF INJECTIONS BOOK: MEMCACHED INJECTIONS
BADGER - THE NETWORKED SECURITY STATE ESTIMATION TOOLKIT