Flamingo Hotel
ThinSIM-based Attacks on Mobile Money Systems
Pwning "the toughest target": the exploit chain of winning the largest bug bounty in the history of ASR program
Ring 0/-2 Rootkits: bypassing defenses
A Journey Into Hexagon: Dissecting a Qualcomm Baseband
WAGGING THE TAIL—COVERT PASSIVE SURVEILLANCE AND HOW TO MAKE THEIR LIFE DIFFICULT
Building the Hacker Tracker
DEF CON 101 Panel
Synfuzz: Building a Grammar Based Re-targetable Test Generation Framework
An Attacker Looks at Docker: Approaching Multi-Container Applications
It's Assembler, Jim, but not as we know it: (ab)using binaries from embedded devices for fun and profit
Dissecting the Teddy Ruxpin: Reverse Engineering the Smart Bear
You can run, but you can't hide. Reverse engineering using X-Ray.
UEFI exploitation for the masses
Weaponizing Unicode: Homographs Beyond IDNs
Automated Discovery of Deserialization Gadget Chains
Your Bank's Digital Side Door
Through the Eyes of the Attacker: Designing Embedded Systems Exploits for Industrial Control Systems
Hacking PLCs and Causing Havoc on Critical Infrastructures
Building Absurd Christmas Light Shows
One Step Ahead of Cheaters -- Instrumenting Android Emulators
House of Roman—a "leakless" heap fengshui to achieve RCE on PIE Binaries
Having fun with IoT: Reverse Engineering and Hacking of Xiaomi IoT Devices
Project Interceptor: avoiding counter-drone systems with nanodrones
Outsmarting the Smart City
The Mouse is Mightier than the Sword
Searching for the Light: Adventures with OpticSpy
Breaking Smart Speakers: We are Listening to You.
Trouble in the tubes: How internet routing security breaks down and how you can do it at home
Betrayed by the keyboard: How what you type can give you away