One Track Mind, Bring it On, and Firetalks
Opening Remarks, Rumblings, Ruminations, and Rants
U2F Zero: Secure Hardware Design, DIY Mass Production, and Amazon Prime
35 Years of Cyberwar: The Squirrels are Winning
Implantable Logic Analyzers and Unlocking Doors
Cyborg Self-Hacking: An Examination of Cochlear Implants
Introducing Jak: Safely Share Sensitive Files via Git
Can a Drunk Person Authenticate Using Brainwaves? #NotAlcoholicsJustResearchers
Keynote: Seven Things: Frank Zappa, T. Coraghassen Boyle, and Twenty-one Years in Security
How to Spoil all Movies and Give an Unforgettable Presentation
Quick and Dirty Emulation of ARM Firmware
NAVRIE Athena — A graph database solution to unify InfoSec data and workflow
22 Short Films About Security
Slash AppSec Costs, Free Threat Modeling & Compliance Data Output
You Can Do the Thing!
A Widening Attack Plain: Threatcasting Tomorrow’s Threats
Ask the Feds
Ask the EFF: Protecting Tomorrow
háček: Computing a Hacker Experience
Flailing is Learning: My First Year as a Malware Analyst
The State of Secure Messaging
The Metadata is the Message (and Sometimes the Message is the Metadata)
A Nickel Tour of the Ad Fraud Ecosystem
The Threat Intel Results are in… You are NOT the hacker! : Disinformation Campaigns vs. Attribution Claims
Challenges and Opportunities: Application Containers and Micro Services
Designing and Executing the World’s First All-Computer Hacking Competition: A panel with the development team
Closing Remarks