What's Lurking Inside MP3 Files That Can Hurt You?
How to Do it Wrong: Smartphone Antivirus and Security Applications Under Fire
Hacking Hotel Keys and Point of Sale Systems: Attacking Systems Using Magnetic Secure Transmission
Examining the Internet's pollution
How to get good seats in the security theater? Hacking boarding passes for fun and profit.
The Other Way to Get a Hairy Hand; or, Contracts for Hackers
Heavy Duty Networks vs Light Duty
0-day Hunting
The Live SEPodcast
CRISPR/Cas9: Newest Tools for Biohacking fun
Hiding Wookiees in HTTP - HTTP smuggling is a thing we should know better and care about
Discovering and Triangulating Rogue Cell Towers
Use Their Machines Against Them: Loading Code with a Copier
Vulnerabilities 101: How to Launch or Improve Your Vulnerability Research Game
Front Door Nightmare
IoT Defenses - Software, Hardware, Wireless and Cloud
Hacking Sensory Perception
Building a Local Passive DNS Tool for Threat Intelligence Research
Managing Digital Codesigning Identities in an Engineering Company
Implants (3)
Attacking BaseStations - an Odyssey through a Telco's Network
Let’s Get Physical: Network Attacks Against Physical Security Systems
Game over, man! – Reversing Video Games to Create an Unbeatable AI Player
So You Think You Want To Be a Penetration Tester
Active Incident Response
Crypto for Criminals - The OPSEC Concerns in Using Cryptography
EagleCAD Basics
Wireless Capture the Flag
My Usability Goes to 11": A Hacker's Guide to User Experience Research
LTE and Its Collective Insecurity
Backdooring Cryptocurrencies: The Underhanded Crypto Contest Winners
Can You Trust Autonomous Vehicles: Contactless Attacks against Sensors of Self-driving Vehicle
Drones Hijacking - multi-dimensional attack vectors and countermeasures
Backdooring the Frontdoor
Mouse Jiggler Offense and Defense
Homologation - Friend or Frenemy?
Attention Hackers: Cannabis Needs Your Help!
Incident Code Name: When SkyFalls A Shaken, Not Stirred, James Bond Tale on Incident Response
Nootropics: Better Living Through Chemistry or Modern-Day Prometheus
Help, I've got ANTs!!!
An Introduction to Pinworm: Man in the Middle for your Metadata
VLAN hopping, ARP Poisoning and Man-In-The-Middle Attacks in Virtualized Environments
Toxic Proxies - Bypassing HTTPS and VPNs to Pwn Your Online Identity
Ads and Messengers: Exploit Me How You Can
Stumping the Mobile Chipset
Cyber Grand Shellphish
Platform agnostic kernel fuzzing
Auditing 6LoWPAN Networks using Standard Penetration Testing Tools
Closing Ceremonies