Unboxing Android: Everything you wanted to know about Android packers
I Know What You Are by the Smell of Your Wifi
Breaking Bitcoin Hardware Wallets
Untrustworthy Hardware and How to Fix It
PEIMA (Probability Engine to Identify Malicious Activity): Using Power Laws to address Denial of Service Attacks
BITSInject
Ghost in the Droid: Possessing Android Applications with ParaSpectre
Welcome - Sunday
Total Recall: Implanting Passwords in Cognitive Memory
Backdooring the Lottery and Other Security Tales in Gaming over the Past 25 Years
Exploiting Continuous Integration (CI) and Automated Build systems
'Ghost Telephonist' Impersonates You Through LTE CSFB
WS: Reasoning about Consensus Algorithms
Cypherpunks History
The Black Art of Wireless Post Exploitation
Are all BSDs are created equally? A survey of BSD kernel vulnerabilities.
The call is coming from inside the house! Are you ready for the next evolution in DDoS attacks?
Genetic Diseases to Guide Digital Hacks of the Human Genome: How the Cancer Moonshot Program will Enable Almost Anyone to Crash the Operating System that Runs You or to End Civilization...
The Key Management Facility of the Root Zone DNSSEC KSK
The Policy & Business Case for Privacy By Design
Game of Chromes: Owning the Web with Zombie Chrome Extensions
Bypassing Android Password Manager Apps Without Root
Malicious CDNs: Identifying Zbot Domains en Masse via SSL Certificates and Bipartite Graphs
Revoke-Obfuscation: PowerShell Obfuscation Detection (And Evasion) Using Science
The Why and How for Secure Automatic Patch Management
Call the plumber - you have a leak in your (named) pipe
Weaponizing Machine Learning: Humanity Was Overrated Anyway
Man in the NFC
Friday the 13th: JSON attacks!
Closing
25 Years of Program Analysis
Closing Ceremony