Abusing native Shims for Post Exploitation
Abusing Adobe Reader’s JavaScript APIs
Docker, Docker, Give Me The News, I Got A Bad Case Of Securing You
How to Hack Government: Technologists as Policy Makers
Ubiquity Forensics - Your iCloud and You
Who Will Rule the Sky? The Coming Drone Policy Wars
Canary: Keeping Your Dick Pics Safe(r)
REpsych: Psychological Warfare in Reverse Engineering
Hijacking Arbitrary .NET Application Control Flow
Knocking my neighbor’s kid’s cruddy drone offline
Pivoting Without Rights – Introducing Pivoter
Stick That In Your (root)Pipe & Smoke It
RFIDiggity: Pentester Guide to Hacking HF/NFC and UHF RFID
Attacking Hypervisors Using Firmware and Hardware
Why nation-state malwares target Telco Networks: Dissecting technical capabilities of Regin and its counterparts
"Quantum" Classification of Malware
Contest Closing Ceremonies
Inter-VM data exfiltration: The art of cache timing covert channel on x86 multi-core
Let's Talk About SOAP, Baby. Let's Talk About UPNP
Advances in Linux Process Forensics Using ECFS
Closing Ceremonies