Hardware-Assisted Rootkits and Instrumentation: ARM Edition - Matt Spisak

Black box reverse engineering for unknown/custom instruction sets - David Carne

Visiting The Bear Den - Joan Calvet, Jessy Campos, Thomas Dupuy

Shooting the OS X El Capitan Kernel Like a Sniper - Liang Chen, Qidan He

JavaJournal - Jason Geffner

BBS-Era Exploitation for Fun and Anachronism - Derek Soeder, Paul Mehta

Dangerous Optimizations and the Loss of Causality - Robert C. Seacord

Breaking Band - Nico Golde, Daniel Komaromy

Process Failure Modes - James Forshaw

How Do I Crack Satellite and Cable Pay TV? - Chris Gerlinsky

Monitoring & controlling kernel-mode events by HyperPlatform - Satoshi Tanda

More Flash, More Fun! - Natalie Silvanovich

A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors - Ang Cui, Francois Charbonneau, Jatin Kataria

Sol[IDA]rity - Markus Gaasedelen, Nick Burnett

Keystone: the last missing framework of Reverse Engineering - Nguyen Anh Quynh

When Governments Attack - Cooper Quintin, Eva Galperin

Reverse Engineering ISC controllers - Jessy Diamond Exum

Abusing the NT Kernel Shim Engine - Alex Ionescu

Movfuscator-Be-Gone - Julian Kirsch, Clemens Jonischkeit

Go Speed Tracer - Richard Johnson