1. Jacob Torrey HARES Hardened Anti Reverse Engineering System

    Jacob Torrey HARES Hardened Anti Reverse Engineering System

    1
  2. Reverse Engineering iOS Mobile Apps Emily Walls, Bucrowd's LevelUp 2017

    Reverse Engineering iOS Mobile Apps Emily Walls, Bucrowd's LevelUp 2017

    1
  3. Another Flip in the Wall of Rowhammer Defenses

    Another Flip in the Wall of Rowhammer Defenses

    1
  4. DICE Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis

    DICE Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis

    1
  5. Episode 104 - A Menagerie of Monsters with the Cryptid Bartender

    Episode 104 - A Menagerie of Monsters with the Cryptid Bartender

    6
  6. Defend The Vote Breakout Session Colonel Phil Waldron

    Defend The Vote Breakout Session Colonel Phil Waldron

    44
  7. Slévárna LIBERLAND, A DECENTRALISED AUTONOMOUS GOVERNMENT Vít Jedlička

    Slévárna LIBERLAND, A DECENTRALISED AUTONOMOUS GOVERNMENT Vít Jedlička

    3
  8. The NSA Playset RF Retroreflectors by Michael Ossmann

    The NSA Playset RF Retroreflectors by Michael Ossmann

    8
  9. Hacking and Defending iPhone Applications with Keven Stadmeyer & Garrett Held, Trustwave SpiderLabs

    Hacking and Defending iPhone Applications with Keven Stadmeyer & Garrett Held, Trustwave SpiderLabs

    13
  10. Hacking and Defending iPhone Application Kevin Stadmeyer, Garrett Held

    Hacking and Defending iPhone Application Kevin Stadmeyer, Garrett Held

    5
  11. Dragonblood Analyzing the Dragonfly Handshake of WPA3 and EAP pwd

    Dragonblood Analyzing the Dragonfly Handshake of WPA3 and EAP pwd

    14
  12. Attacking & Securing HealthCare Standards & Hospital Secured Systems Ajay Pratap Singh

    Attacking & Securing HealthCare Standards & Hospital Secured Systems Ajay Pratap Singh

    5
  13. Abusing & Security XPC in macOS apps Wojciech Regula

    Abusing & Security XPC in macOS apps Wojciech Regula

    2
  14. The Rest of the Story Securing a Raspberry Pi Home Monitoring System Laurel Marotta

    The Rest of the Story Securing a Raspberry Pi Home Monitoring System Laurel Marotta

    1
  15. Danny Cooper & Allan Wirth Homeward Bound Scanning Private IP Space with DNS Rebinding

    Danny Cooper & Allan Wirth Homeward Bound Scanning Private IP Space with DNS Rebinding

    4
  16. The Impact of BGP Misconfiguration on Connectivity

    The Impact of BGP Misconfiguration on Connectivity

    3
  17. A Systematic Approach to BGP Configuration Checking

    A Systematic Approach to BGP Configuration Checking

    3
  18. R BGP Ensuring Connectivity During BGP Convergence

    R BGP Ensuring Connectivity During BGP Convergence

    2
  19. Drone Attacks How I hijacked a drone by Rahul Sasi

    Drone Attacks How I hijacked a drone by Rahul Sasi

    4
  20. Security of GPS INS based On road Location Tracking Systems

    Security of GPS INS based On road Location Tracking Systems

    8