Is That a Router in Your Pocket or Are You Trying to P0wn Me?
TBD
How I Stopped Worrying and Learned to Love InfraOps
PHaaS - Phishing as a Service
Voltron: Defender of Your Inferiors
Malware is Hard. Let’s Go Shopping!
The Little-Known Horrors of Web Application Session Management
DNS Miner - A Semi-Automatic Incident Response and Threat Intelligence Tool for Small - Over Worked Security Teams
Blue Team Army - It’s *Your* Network - Defend It!
Circles & Boxes - Drawing SecArch into Your Program
The Pentesters Framework
Hack My Derby
Practical Hardware Attacks Against Soho Routers & the Internet of Things
Invasion of the Hash Snatchers
LongTail SSH Attack Analysis
Disecting Wassenaar
Stretching the Sandbox with Malware Feature Vectors
My Password Cracking Brings All the Hashes to the Yard.
Hunting Unicorns and Jerks - Irrational, Defensible, or Necessary?
Five Hardware Hacking Projects Under $30
Gnuradio Demystifying RF Black Magic
Intrusion Hunting for the Masses - A Practical Guide
The Problems with JNI Obfuscation in the Android Operating System
Confessions of a Crypto Cluster Operator
Closing Ceremonies