DARPA Cyber Grand Challenge Award Ceremony
Project CITL
Blockfighting with a Hooker -- BlockfFghter2!
(Ab)using Smart Cities: The Dark Age of Modern Mobility
A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors
Slouching Towards Utopia: The State of the Internet Dream
Side-channel Attacks on High-security Electronic Safe Locks
Samsung Pay: Tokenized Numbers, Flaws and Issues
Sk3wlDbg: Emulating All (well many) of the Things with Ida
I Fight For The Users, Episode I - Attacks Against Top Consumer Products
Light-Weight Protocol! Serious Equipment! Critical Implications!
Stargate: Pivoting Through VNC to Own Internal Networks
pin2pwn: How to Root an Embedded Linux Box with a Sewing Needle
MouseJack: Injecting Keystrokes into Wireless Mice
Universal Serial aBUSe: Remote Physical Access Attacks
Playing Through the Pain? - The Impact of Secrets and Dark Knowledge on Security and Intelligence Professionals
DIY Nukeproofing: A New Dig at 'Datamining'
All Your Solar Panels are Belong to Me
Abusing Bleeding Edge Web Standards for AppSec Glory
Hacking Hotel Keys and Point of Sale Systems: Attacking Systems Using Magnetic Secure Transmission
Discovering and Triangulating Rogue Cell Towers
Let’s Get Physical: Network Attacks Against Physical Security Systems
Drones Hijacking - multi-dimensional attack vectors and countermeasures
An Introduction to Pinworm: Man in the Middle for your Metadata
Cyber Grand Shellphish