• Hopeless Relay Protection for Substation Automation

    – Kirill Nesterov, Alexander Tlyapov

  • Transforming Open Source to Open Access in Closed Applications

    – Brian Gorenc, Jasiel Spelman, Abdul-Aziz Hariri

  • r2m2

    – Guillaume VALADON / guedou

  • Hackable Security Modules Reversing and exploiting a FIPS 140-2 lvl 3 HSM firmware

    – Fotis Loukos

  • GRAP: define and match graph patterns within binaries

    – Aurelien Thierry, Jonathan Thieuleux

  • Analyzing iOS apps: road from AppStore to security analysis report

    – Lenar Safin, Yaroslav Alexandrov, Egor Fominykh, Alexander Chernov, Katerina Troshina

  • miLazyCracker

    – Kevin Larson

  • Baring the system

    – Yuriy Bulygin, Oleksandr Bazhaniuk

  • Reverse engineering of file formats and network protocols using Kaitai Struct

    – Mikhail Yakshin

  • Poutine: Dusting Forgotten Lore

    – Yannick Lamarre

  • TBA

    – Alex Ionescu

  • Harnessing Intel Processor Trace on Windows for fuzzing and dynamic analysis

    – Andrea Allievi, Richard Johnson

  • Your Chakra Is Not Aligned 30min

    – Natalie Silvanovich

  • Legacy Crypto Never Dies

    – David Hulton

  • Teaching Old Shellcode New Tricks

    – Josh Pitts

  • Reverse Engineering Satellite Based IP Content Distribution

    – Taylor Jacob

  • Embedded devices reverse engineering

    –Vitor Ventura, Vladan Nikolić

  • A Little Less Conversation, A Little More ActionScript

    – WanderingGlitch

  • Contributor analysis

    – Francisco Blas Izquierdo Riera (klondike)

  • Breaking Code Read Protection on the NXP LPC-family Microcontrollers

    – Chris Gerlinsky