Secret Tools: Learning about Government Surveillance Software You Can't Ever See
Panel: Meet The Feds
Hacking Democracy: A Socratic Dialogue
Next-Generation Tor Onion Services
How we created the first SHA-1 collision and what it means for hash security
Abusing Certificate Transparency Logs
"Tick, Tick, Tick. Boom! You're Dead." — Tech & the FTC
The Internet Already Knows I'm Pregnant
The spear to break the security wall of S7CommPlus
(Un)Fucking Forensics: Active/Passive (i.e. Offensive/Defensive) memory hacking/debugging.
Evading next-gen AV using artificial intelligence
All Your Things Are Belong To Us
A Picture is Worth a Thousand Words, Literally: Deep Neural Networks for Social Stego
XenoScan: Scanning Memory Like a Boss
Digital Vengeance: Exploiting the Most Notorious C&C Toolkits
Game of Drones: Putting the Emerging "Drone Defense" Market to the Test
Popping a Smart Gun
Untrustworthy Hardware and How to Fix It
Ghost in the Droid: Possessing Android Applications with ParaSpectre
'Ghost Telephonist' Impersonates You Through LTE CSFB
Genetic Diseases to Guide Digital Hacks of the Human Genome: How the Cancer Moonshot Program will Enable Almost Anyone to Crash the Operating System that Runs You or to End Civilization...
Revoke-Obfuscation: PowerShell Obfuscation Detection (And Evasion) Using Science
Friday the 13th: JSON attacks!