Amazon ballroom, near side
Making Sense of Static - New Tools for Hacking GPS
Can You Track Me Now? Government And Corporate Surveillance Of Mobile Geo-Location Data
Don't Stand So Close To Me: An Analysis of the NFC Attack Surface
NFC Hacking: The Easy Way
Attacking TPM Part 2: A Look at the ST19WP18 TPM Device
Bypassing Endpoint Security for $20 or Less
Safes and Containers: Insecurity Design Excellence
Beyond the War on General Purpose Computing: What's Inside the Box?
Owning Bad Guys {And Mafia} With Javascript Botnets
Botnets Die Hard - Owned and Operated
Hardware Backdooring is Practical
Hacking Measured Boot and UEFI
DDoS Black and White "Kungfu" Revealed
Overwriting the Exception Handling Cache PointerDwarf Oriented Programming
The DCWG Debriefing - How the FBI Grabbed a Bot and Saved the Internet
OPFOR 4Ever
Improving Web Vulnerability Scanning
Post Metasploitation: Improving Accuracy and Efficiency in Post Exploitation Using the Metasploit Framework
Weaponizing the Windows API with Metasploit’s Railgun
Kevin Poulsen Answers Your Questions
Owned in 60 Seconds: From Network Guest to Windows Domain Admin
Subterfuge: The Automated Man-in-the-Middle Attack Framework