Brasilia ballroom, next to CTF
Embedded Device Firmware Vulnerability Hunting Using FRAK, the Firmware Reverse Analysis Konsole
APK File Infection on an Android System
Passive Bluetooth Monitoring in Scapy
Not-So-Limited Warranty: Target Attacks on Warranties for Fun and Profit
Not So Super Notes, How Well Does US Dollar Note Security Prevent Counterfeiting?
The Open Cyber Challenge Platform
How to Channel Your Inner Henry Rollins
Bad (and Sometimes Good) Tech Policy: It's Not Just a DC Thing
Scylla: Because There's no Patch for Human Stupidity
Drinking From the Caffeine Firehose We Know as Shodan
Network Anti-Reconnaissance: Messing with Nmap Through Smoke and Mirrors
How to Hack VMware vCenter Server in 60 Seconds
Demorpheus: Getting Rid Of Polymorphic Shellcodes In Your Network
New Techniques in SQLi Obfuscation: SQL never before used in SQLi
DivaShark - Monitor your Flow
Blind XSS
Creating an A1 Security Kernel in the 1980s (Using “Stone Knives and Bear Skins”)
Exploit Archaeology: Raiders of the Lost Payphones
Into the Droid: Gaining Access to Android User Data
Hellaphone: Replacing the Java in Android
Off-Grid Communications with Android: Meshing the Mobile World
Exchanging Demands
Spy vs Spy: Spying on Mobile Device Spyware
The Darknet of Things, Building Sensor Networks That Do Your Bidding
We Have You by the Gadgets
No More Hooks: Detection of Code Integrity Attacks
Owning the Network: Adventures in Router Rootkits
Hacking [Redacted] Routers
SQL Injection to MIPS Overflows: Rooting SOHO Routers
bbqSQL - Rapid Blind SQL Injection Exploitation
SQL ReInjector - Automated Exfiltrated Data Identification