Feds and 0Days: From Before Heartbleed to After FBI-Apple
Compelled Decryption - State of the Art in Doctrinal Perversions
Honey Onions: Exposing Snooping Tor HSDir Relays
Frontrunning the Frontrunners
Research on the Machines: Help the FTC Protect Privacy & Security
How to Design Distributed Systems Resilient Despite Malicious Participants
How to Remote Control an Airliner: SecurityFLawsin Avionics
Robot Hacks Video Games: How TASBot Exploits Consoles with Custom Controllers
Hacking Next-Gen ATM's From Capture to Cashout
How to Overthrow a Government
Jittery MacGyver: Lessons Learned from Building a Bionic Hand out of a Coffee Maker
Bypassing Captive Portals and Limited Networks
Retweet to Win: How 50 lines of Python made me the luckiest guy on Twitter
Six Degrees of Domain Admin - Using Graph Theory to Accelerate Red Team Operations
Weaponizing Data Science for Social Engineering: Automated E2E Spear Phishing on Twitter
Forcing a Targeted LTE Cellphone into an Unsafe Network
'Cyber' Who Done It?! Attribution Analysis Through Arrest History
Drunk Hacker History: Hacker Stories Powered by C2H6O for Fun & Profit
How to Do it Wrong: Smartphone Antivirus and Security Applications Under Fire
Hiding Wookiees in HTTP - HTTP smuggling is a thing we should know better and care about
Attacking BaseStations - an Odyssey through a Telco's Network
Can You Trust Autonomous Vehicles: Contactless Attacks against Sensors of Self-driving Vehicle
Help, I've got ANTs!!!
Stumping the Mobile Chipset
Closing Ceremonies