| CLOSING KEYNOTE - Natalie Silvanovich - The ECMA and The Chakra.pdf | 2017-04-15 16:22 | 459K | |
| D1T1 - A New RISC - Don Bailey.pdf | 2017-04-13 14:42 | 22M | |
| D1T1 - Ayoub Elaassal - Hacking Customer Information System.pdf | 2017-04-13 11:23 | 4.3M | |
| D1T1 - Michele Spagnuolo and Lukas Wilschelbaum - So We Broke All CSPS.pdf | 2017-04-13 12:25 | 1.6M | |
| D1T1 - Richard Johnson - Harnessing Intel Processor Trace on Windows for Vulnerability Discovery.pdf | 2017-04-13 18:07 | 3.8M | |
| D1T1 - Steven Seeley and Roberto Suggi Liverani - I Got 99 Trends and a # Is All Of Them.pdf | 2017-04-13 18:27 | 154M | |
| D1T1 - Victor van der Veen - Drammer The Making Of.pdf | 2017-04-13 15:51 | 26M | |
| D1T2 - JeongHoon Shin - Femotcell Hacking.pdf | 2017-04-13 16:03 | 4.4M | |
| D1T2 - Jos Wyers - A Guide to Key Impressioning Attacks.pdf | 2017-04-13 18:05 | 120M | |
| D1T2 - Linan Hao and Long Liu - The Secret of ChakraCore.pdf | 2017-04-13 14:44 | 2.0M | |
| D1T2 - Najwa Aaraj - Side Channel Attacks Against iOS Crypto Libraries and More.pdf | 2017-04-13 18:34 | 1.6M | |
| D1T2 - Seunghun Han - Shadow-Box - The Practical and Omnipotent Sandbox.pdf | 2017-04-13 17:00 | 2.5M | |
| D1T2 - Slawomir Jasek - Cloning Any Android HCE Contactless Card.pdf | 2017-04-13 13:36 | 2.8M | |
| D1T3 - Clarence Chio and Anto Joseph - Practical Machine Learning in Infosecurity.pdf | 2017-04-13 14:33 | 2.3M | |
| D1T3 - Didier Stevens - Analyzing Malicious Office Documents.pdf | 2017-04-13 17:16 | 833K | |
| D1T3 - Steve Lord - Unbridled HIDIOcy.pdf | 2017-04-13 17:25 | 1.6M | |
| D1T4 - Dominic Spill - Low Cost Open Source Spectrum Monitoring.pdf | 2017-04-13 18:04 | 24M | |
| D1T4 - George Chatzisofroniou - Exploiting Windows Automatic Wireless Association Algorithm.pdf | 2017-04-13 16:38 | 1.0M | |
| D1T4 - Marc Newlin and Matt Knight - So You Want to Hack Radios.pdf | 2017-04-13 17:15 | 10M | |
| D1T4 - Miika Turkia - Pwning Banks.pdf | 2017-04-13 14:34 | 519K | |
| D1T4 - Niek Timmers and Albert Spruyt - Fault Injection Attacks On Secure Boot.pdf | 2017-04-13 18:38 | 2.6M | |
| D1T4 - Niels Warnars - Disarming EMET.pdf | 2017-04-13 11:10 | 267K | |
| D1T4 - Patrick Wardle - Meet and Greet with the MacOS Malware Class of 2016.pdf | 2017-04-13 15:36 | 17M | |
| D1T4 - Paulus Meesen and Don Mulders - A Passive Listing Ransomware Detector.pdf | 2017-04-13 12:20 | 710K | |
| D1T4 - Vladamir Katalov - Breaking Apple’s iCloud Keychain.pdf | 2017-04-13 12:20 | 5.9M | |
| D2T1 - Ben Hayak - Advanced Same Origin Method Execution.pdf | 2017-04-14 11:25 | 19M | |
| D2T1 - Bing Sun and Chong Xu - Bypassing Memory Mitigation Using Data-Only Exploitation Techniques.pdf | 2017-04-14 16:02 | 3.5M | |
| D2T1 - Markus Vervier - Hunting for Vulnerabilities in Signal.pdf | 2017-04-14 14:31 | 4.7M | |
| D2T1 - Patrick Wardle - Oversight - Exposing Spies on MacOS.pdf | 2017-04-14 16:12 | 27M | |
| D2T1 - S. Huber, S. Artz and S. Rasthofer - Vulnerabilities in Android Password Managers.pdf | 2017-04-14 14:05 | 2.3M | |
| D2T1 - Trammel Hudson - Bootstrapping Systems with Open Source Firmware.pdf | 2017-04-14 17:28 | 16M | |
| D2T2 - Anirudh Duggal - Hacking Medical Devices and Healthcare Infrastructure.pdf | 2017-04-14 17:24 | 3.8M | |
| D2T2 - Antonios Atlasis - An Attack-in-Depth Analysis of Multicast DNS and DNS Service Discovery.pdf | 2017-04-14 14:31 | 5.2M | |
| D2T2 - Yingtao Zeng, Qing Yang and Jun Li - Car Keyless Entry System Attacks.pdf | 2017-04-14 12:00 | 8.5M | |
| D2T2 - Yu Hong - Attack Surface Extended by URL Schemes.pdf | 2017-04-14 14:05 | 12M | |
| D2T3 - James Forshaw - Introduction to Logical Privilege Escalation on Windows.pdf | 2017-04-14 14:09 | 3.1M | |
| D2T3 - Slawomir Jasek - Blue Picking - Hacking Bluetooth Smart Locks.pdf | 2017-04-18 21:59 | 6.8M | |
| D2T4 - Aseem Jakhar - IoT Hacking Simplified.pdf | 2017-04-14 16:01 | 33M | |
| D2T4 - Chris van den Hooven - Will It Blend? CISOs and Hackers.pdf | 2017-04-14 14:38 | 610K | |
| D2T4 - Don Bailey - Unauthorized Erlang.pdf | 2017-04-14 15:59 | 822K | |
| D2T4 - Emmanuel Gadaix - A Surprise Encounter With a Telco APT.pdf | 2017-04-14 16:04 | 75M | |
| D2T4 - Koh Yong Chuan - Understanding the Microsoft Ofice 2016 Protected View Sandbox.pdf | 2017-04-14 11:24 | 2.3M | |
| D2T4 - Maxim Goryachy and Mark Ermalov - Intel DCI Secrets.pdf | 2017-04-14 12:04 | 20M | |
| D2T4 - Muhamad Abdul Wahab and Pascal Cortret - Pwning ARM Debug Components.pdf | 2017-04-14 11:07 | 2.3M | |
| D2T4 - Rob Fletcher - Bug Bounty from a Program’s Perspective.pdf | 2017-04-14 14:33 | 637K | |
| D2T4 - Steven Wierckx - How to Make a Magic Mirror.pdf | 2017-04-14 17:21 | 3.2M | |
| KEYNOTE 1 - Saumil Shah - Redefining Defense.pdf | 2017-04-13 10:51 | 19M | |