0wn the Con
A Critical Review of Spatial Analysis
ADD -- Complicating Memory Forensics Through Memory Disarray
Android Forensics & Security Testing
Android Forensics & Security Testing (repeat)
An Introduction to Cellular Security
An Open and Affordable USB Man in the Middle Device
Another Log to Analyze – Utilizing DNS to Discover Malware in Your Network
Arms Race: The Story of (In)-Secure Bootloaders
Attacker Ghost Stories: Mostly Free Defenses That Give Attackers Nightmares
AV Evasion With the Veil Framework
Building An Information Security Awareness Program From Scratch
CCTV: Setup, Attack Vectors, and Laws
Closing Remarks
Controlling USB Flash Drive Controllers: Expose of Hidden Features
Crossing the Streams with State Machines in IDS Signature Languages
Data Whales and Troll Tears: Beat the Odds in InfoSec
Dissipation of Hackers in the Enterprise
Exploits 2: Exploitation in the Windows Environment
Eyes on IZON: Surveilling IP Camera Security
Flow Analysis & Network Hunting
Genuinely "Trusted Computing:" Free and Open Hardware Security Modules
Get Out of Jail Free Cards? What Aviation Can Teach Us About Information Sharing
Having Your Cake and Eating It Too: FOIA, Surveillance, and Privacy
How Hackers for Charity (Possibly) Saved Me a Lot of Money
"How I Met Your Mother" or The Brief and Secret History of Bletchley Park and How They Invented Cryptography and the Computer Age
How to Train your Snapdragon: Exploring Power Frameworks on Android
I Found a Thing and You Can (Should) Too: ISP's Unauthenticated SOAP Service = Find (Almost) All The Things!
Intermediate Intel x86: Architecture, Assembly, Applications, & Alliteration
Introducing DARPA's Cyber Grand Challenge
Introducing idb - Simplified Blackbox iOS App Pentesting
Introduction to ARM
Introduction To Reverse Engineering Software
Introduction To Reverse Engineering Software (repeat)
Introduction To Software Exploits
Introduction To Vulnerability Assessment
Introductory Intel x86: Architecture, Assembly, Applications, & Alliteration
Introductory Intel x86: Architecture, Assembly, Applications, & Alliteration (repeat)
Large Scale Network and Application Scanning
Lessons-Learned in Designing a Training Course for Professionals
LTE vs. Darwin
Malicious Online Activities Related to the 2012 U.S. General Election
Malicious Threats, Vulnerabilities, and Defenses in WhatsApp and Mobile Instant Messaging Platforms
Malware Dynamic Analysis
Offensive, Defensive, and Forensic Techniques for Determining Web User Identity
Opening Remarks, Rumblings, and Rants
Operationalizing Threat Information Sharing: Beyond Policies and Platitudes
Pcap Analysis & Network Hunting
Practical Applications of Data Science in Detection
Privacy Online: What Now?
Raising Costs for Your Attackers Instead of Your CFO
Reverse Engineering Malware
Rootkits: What they are, and how to find them
SafeCurves: Choosing Safe Curves for Elliptic-Curve Cryptography
Security Analytics: Less Hype, More Data
Syncing Mentorship Between Winners And Beginners
Technology Law Issues for Security Professionals
The Evolution of Linux Kernel Module Signing
The Life of Binaries
The NSA: Capabilities and Countermeasures
The "Science of Cyber" and the Next Generation of Security Tools
Timing-Based Attestation: Sexy Defense, or the Sexiest?
TrendCoins: Making Money on the Bitcoin/Altcoin Trends
Unambiguous Encapsulation - Separating Data and Signaling
unROP: A Tool for In-Memory ROP Exploitation Detection and Traceback
Vehicle Forensics - The Data Beyond the Dashboard
Weaponizing Your Pets: War Kitteh and the Denial of Service Dog
Windows Attacks: AT Is the New Black
Womens Tech Collective, and Gender Equality in Tech
Writing Your Own Disassembler in 15 Minutes
You Don't Have the Evidence
You Name It, We Analyze It