0wn the Con
22 Short Films About Security
35 Years of Cyberwar: The Squirrels are Winning
A Context-Aware Kernel IPC Firewall for Android
A Nickel Tour of the Ad Fraud Ecosystem
Anti-Ransomware: Turning the Tables
Ask the EFF: Protecting Tomorrow
Ask the Feds
A Widening Attack Plain: Threatcasting Tomorrow’s Threats
Can a Drunk Person Authenticate Using Brainwaves? #NotAlcoholicsJustResearchers
Challenges and Opportunities: Application Containers and Micro Services
Closing Remarks
Cyborg Self-Hacking: An Examination of Cochlear Implants
Defeating Sandbox Evasion: How to Increase Successful Emulation Rate in Your Virtualized Environment
Designing and Executing the World’s First All-Computer Hacking Competition: A panel with the development team
Dig Out Your Brick Phone! Bringing AMPS Back with GNU Radio
Does a BEAR Leak in the Woods? The Democratic National Committee breach, Russian APTs, and the 2016 U.S. Election
Excuse me, Server, Do You Have the Time?
Exploring The Infrared World
Flailing is Learning: My First Year as a Malware Analyst
Goodnight Moon & the House of Horrors: A look at the current IoT ecosystem and the regulations trying to control it
háček: Computing a Hacker Experience
How to Spoil all Movies and Give an Unforgettable Presentation
I Have a Graph Database. Now What?
Implantable Logic Analyzers and Unlocking Doors
(In-)secure messaging with SCIMP and OMEMO
Introducing Jak: Safely Share Sensitive Files via Git
Keynote: Seven Things: Frank Zappa, T. Coraghassen Boyle, and Twenty-one Years in Security
Know Normal, Find Evil: Windows 10 Edition
LangSec for Penetration Testing: How and Why
NAVRIE Athena — A graph database solution to unify InfoSec data and workflow
Opening Remarks, Rumblings, Ruminations, and Rants
Plug-in Electric Vehicle Fingerprinting: Authentication for Plug-in Electric Vehicles
Quick and Dirty Emulation of ARM Firmware
ripr – Run Slices of Binary Code from Python
Safety Bot Guaranteed
Slash AppSec Costs, Free Threat Modeling & Compliance Data Output
So You Want to Hack Radios
The Metadata is the Message (and Sometimes the Message is the Metadata)
The State of Secure Messaging
The Threat Intel Results are in… You are NOT the hacker! : Disinformation Campaigns vs. Attribution Claims
U2F Zero: Secure Hardware Design, DIY Mass Production, and Amazon Prime
User Focused Security at Netflix: Stethoscope
WaveConverter – An Open Source Software Tool for RF Reverse Engineering
Who Wants to Allow Arbitrary Code Execution on Their Boxes? We Do It Every Day.
You Can Do the Thing!