The Cavalry Year[0] & a Path Forward for Public Safety
Hack All The Things: 20 Devices in 45 Minutes
Hacking 911: Adventures in Disruption, Destruction, and Death
Mass Scanning the Internet: Tips, Tricks, Results
Screw Becoming A Pentester - When I Grow Up I Want To Be A Bug Bounty Hunter!
SHA1 backdooring and exploitation
Don't Fuck It Up!
The Internet of Fails: Where IoT Has Gone Wrong and How We're Making It Right
Girl… Fault-Interrupted.
I Hunt TR-069 Admins: Pwning ISPs Like a Boss
Bug Bounty Programs Evolution
How To Make Money Fast Using A Pwned PBX
Summary of Attacks Against BIOS and Secure Boot
Logging ALL THE THINGS Without All The Cost With Open Source Big Data Tools </buzzwords>
Cyberhijacking Airplanes: Truth or Fiction?
Don't DDoS Me Bro: Practical DDoS Defense
How to Disclose an Exploit Without Getting in Trouble
For a good time, call....
Secure Random By Default
PropLANE: Kind of keeping the NSA from watching you pee
Just What The Doctor Ordered?
Secure Because Math: A Deep Dive On Machine Learning-Based Monitoring
Instrumenting Point-of-Sale Malware: A Case Study in Communicating Malware Analysis More Effectively
NinjaTV - Increasing Your Smart TV’s IQ Without Bricking It
Masquerade: How a Helpful Man-in-the-Middle Can Help You Evade Monitoring.
The Monkey in the Middle: A pentesters guide to playing in traffic.
Advanced Red Teaming: All Your Badges Are Belong To Us
A Survey of Remote Automotive Attack Surfaces
Impostor — Polluting Tor Metadata
VoIP Wars: Attack of the Cisco Phones
Detecting Bluetooth Surveillance Systems
Breaking MIFARE ULTRALIGHT... or how to get free rides and more
Check Your Fingerprints: Cloning the Strong Set
Manna from Heaven: Improving the state of wireless rogue AP attacks
Learn how to control every room at a luxury hotel remotely: the dangers of insecure home automation deployment
Ask the EFF: The Year in Digital Civil Liberties
Abusing Software Defined Networks
Touring the Darkside of the Internet. An Introduction to Tor, Darknets, and Bitcoin
Security with Anch: Another Talk, Another Drink.
Raspberry MoCA - A recipe for compromise
Attacking the Internet of Things using Time
Getting Windows to Play with Itself: A Hacker's Guide to Windows API Abuse
DEF CON the Mystery, Myth and Legend
Security's in your DNA: Using Genomics & Big Data for Security
Old Skewl Hacking: Porn Free!
Surveillance on the Silver Screen- Fact or Fiction?