Your Chakra Is Not Aligned - Natalie Silvanovich

Hackable Security Modules Reversing and exploiting a FIPS 140-2 lvl 3 HSM firmware - Fotis Loukos

Reverse Engineering Satellite Based IP Content Distribution - Taylor Jacob

Harnessing Intel Processor Trace on Windows for fuzzing and dynamic analysis - Andrea Allievi, Richard Johnson

Contributor analysis - Francisco Blas Izquierdo Riera (Klondike)

GRAP: define and match graph patterns within binaries - Aurelien Thierry, Jonathan Thieuleux

r2m2 - Guillaume “guedou” Valadon

Breaking Code Read Protection on the NXP LPC-family Microcontrollers - Chris Gerlinsky

Teaching Old Shellcode New Tricks - Josh Pitts

Analyzing iOS apps: road from AppStore to security analysis report - Lenar Safin, Yaroslav Alexandrov, Egor Fominykh, Alexander Chernov

miLazyCracker Kevin Larson

Legacy Crypto Never Dies - David Hulton

Embedded devices reverse engineering - Vitor Ventura, Vladan Nikolić

Getting Physical with USB Type-C: Windows 10 RAM Forensics and UEFI Attacks - Alex Ionescu

Poutine: Dusting Forgotten Lore - Yannick Lamarre

Transforming Open Source to Open Access in Closed Applications - Brian Gorenc, Jasiel Spelman, Abdul-Aziz Hariri

A Little Less Conversation, A Little More ActionScript - WanderingGlitch

Baring the system: New vulnerabilities in SMM of Coreboot and UEFI based systems - Yuriy Bulygin, Oleksandr Bazhaniuk

Lightning talks

When your firewall turns against you - Rene Freingruber

Keeping-your-tools-safe - Arnaud Diederen