Synfuzz: Building a Grammar Based Re-targetable Test Generation Framework
Welcome To DEF CON & Badge Maker Talk
De-anonymizing Programmers from Source Code and Binaries
Securing our Nation's Election Infrastructure
Please do not Duplicate: Attacking the Knox Box and Other Keyed Alike Systems
An Attacker Looks at Docker: Approaching Multi-Container Applications
NSA Talks Cybersecurity
One-liners to Rule Them All
Lora Smart Water Meter Security Analysis
It's Assembler, Jim, but not as we know it: (ab)using binaries from embedded devices for fun and profit
Vulnerable Out of the Box: An Evaluation of Android Carrier Devices
Breaking Paser Logic: Take Your Path Normalization Off and Pop 0days Out!
Who Controls the Controllers—Hacking Crestron IoT Automation Systems
Dissecting the Teddy Ruxpin: Reverse Engineering the Smart Bear
Compromising online accounts by cracking voicemail systems
Finding Xori: Malware Analysis Triage with Automated Disassembly
One-Click to OWA
You can run, but you can't hide. Reverse engineering using X-Ray.
Dragnet—Your Social Engineering Sidekick
Hacking the Brain: Customize Evil Protocol to Pwn an SDN Controller
Fasten your seatbelts: We are escaping iOS 11 sandbox!
UEFI exploitation for the masses
GOD MODE UNLOCKED: Hardware Backdoors in [redacted] x86 CPUs
4G—Who is paying your cellular phone bill?
Revolting Radios
Weaponizing Unicode: Homographs Beyond IDNs
Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010
Playback: a TLS 1.3 story
Privacy infrastructure, challenges and opportunities
Automated Discovery of Deserialization Gadget Chains
Your Peripheral Has Planted Malware—An Exploit of NXP SOCs Vulnerability
Practical & Improved Wifi MitM with Mana
Your Voice is My Passport
Your Bank's Digital Side Door
I'll See Your Missile and Raise You A MIRV: An overview of the Genesis Scripting Engine
The L0pht Testimony, 20 Years Later (and Other Things You Were Afraid to Ask)
Reverse Engineering, hacking documentary series
Disrupting the Digital Dystopia or What the hell is happening in computer law?
D0 N0 H4RM: A Healthcare Security Conversation
Oh Noes! — A Role Playing Incident Response Game