The Applications of Deep Learning on Traffic Identification
CrackLord: Maximizing Password Cracking Boxes
Remote Physical Damage 101 - Bread and Butter Attacks
Attacking Your Trusted Core: Exploiting Trustzone on Android
TrustKit: Code Injection on iOS 8 for the Greater Good
ROPInjector: Using Return Oriented Programming for Polymorphism and Antivirus Evasion
My Bro the ELK: Obtaining Context from Security Events
Exploiting XXE Vulnerabilities in File Parsing Functionality
Taxonomic Modeling of Security Threats in Software Defined Networking
Battle of the SKM and IUM: How Windows 10 Rewrites OS Architecture
Web Timing Attacks Made Practical
Repurposing OnionDuke: A Single Case Study Around Reusing Nation State Malware
The NSA Playset: A Year of Toys and Tools
The Memory Sinkhole - Unleashing an x86 Design Flaw Allowing Universal Privilege Escalation
Bringing a Cannon to a Knife Fight
Certifi-gate: Front-Door Access to Pwning Millions of Androids
Bypass Surgery Abusing Content Delivery Networks with Server-Side-Request Forgery (SSRF) Flash and DNS
The Kali Linux Dojo Workshop #1: Rolling Your Own - Generating Custom Kali Linux 20 ISOs
Taking Event Correlation with You
Breaking Access Controls with BLEKey
Panel: How the Wassenaar Arrangements Export Control of Intrusion Software Affects the Security Industry
Defeating Machine Learning: What Your Security Vendor is Not Telling You
Ah! Universal Android Rooting is Back
How to Implement IT Security After a Cyber Meltdown
Return to Where? You Cant Exploit What You Cant Find
Staying Persistent in Software Defined Networks
The Kali Linux Dojo Workshop #2: Kali USB Setups with Persistent Stores and LUKS Nuke Support
Internet-Facing PLCs - A New Back Orifice
Forging the USB Armory an Open Source Secure Flash-Drive-Sized Computer
Information Access and Information Sharing: Where We are and Where We are Going
From False Positives to Actionable Analysis: Behavioral Intrusion Detection Machine Learning and the SOC
Fingerprints on Mobile Devices: Abusing and Leaking
ZigBee Exploited the Good the Bad and the Ugly
Bypass Control Flow Guard Comprehensively
Breaking Honeypots for Fun and Profit
BGP Stream
Internet-Scale File Analysis
When IoT Attacks: Hacking a Linux-Powered Rifle
Is the NSA Still Listening to Your Phone Calls? A Surveillance Debate: Congressional Success or Epic Fail
Automated Human Vulnerability Scanning with AVA
Pen Testing a City
Broadcasting Your Attack: Security Testing DAB Radio in Cars
Assessing and Exploiting BigNum Vulnerabilities
Understanding the Attack Surface and Attack Resilience of Project Spartans New EdgeHTML Rendering Engine
Review and Exploit Neglected Attack Surfaces in iOS 8
ThunderStrike 2: Sith Strike
Abusing XSLT for Practical Attacks
Rocking the Pocket Book: Hacking Chemical Plant for Competition and Extortion
Advanced IC Reverse Engineering Techniques: In Depth Analysis of a Modern Smart Card
Social Engineering the Windows Kernel: Finding and Exploiting Token Handling Vulnerabilities
Deep Learning on Disassembly
HI THIS IS URGENT PLZ FIX ASAP: Critical Vulnerabilities and Bug Bounty Programs
Using Static Binary Analysis to Find Vulnerabilities and Backdoors in Firmware
Breaking Payloads with Runtime Code Stripping and Image Freezing
Dom Flow - Untangling the DOM for More Easy-Juicy Bugs
Fuzzing Android System Services by Binder Call to Escalate Privilege
Harnessing Intelligence from Malware Repositories
Most Ransomware Isnt as Complex as You Might Think
FileCry - The New Age of XXE
Exploiting Out-of-Order Execution for Covert Cross-VM Communication
Hidden Risks of Biometric Identifiers and How to Avoid Them
API Deobfuscator: Resolving Obfuscated API Functions in Modern Packers
Dance Like Nobodys Watching Encrypt Like Everyone Is: A Peek Inside the Black Hat Network