ThinSIM-based Attacks on Mobile Money Systems
Pwning "the toughest target": the exploit chain of winning the largest bug bounty in the history of ASR program
Ring 0/-2 Rootkits: bypassing defenses
A Journey Into Hexagon: Dissecting a Qualcomm Baseband
WAGGING THE TAIL—COVERT PASSIVE SURVEILLANCE AND HOW TO MAKE THEIR LIFE DIFFICULT
Building the Hacker Tracker
DEF CON 101 Panel