Exploiting Windows Exploit Mitigation for ROP Exploits
Breaking Google Home: Exploit It with SQLite(Magellan)
Are Quantum Computers Really A Threat To Cryptography? A Practical Overview Of Current State-Of-The-Art Techniques With Some Interesting Surprises
Intro to Embedded Hacking—How you too can find a decade old bug in widely deployed devices. [REDACTED] Deskphones, a case study.
Web2Own: Attacking Desktop Apps From Web Security's Perspective
DEF CON 101 Panel