-
Hopeless Relay Protection for Substation Automation
– Kirill Nesterov, Alexander Tlyapov
-
Transforming Open Source to Open Access in Closed Applications
– Brian Gorenc, Jasiel Spelman, Abdul-Aziz Hariri
-
r2m2
– Guillaume VALADON / guedou
-
Hackable Security Modules Reversing and exploiting a FIPS 140-2 lvl 3 HSM firmware
– Fotis Loukos
-
GRAP: define and match graph patterns within binaries
– Aurelien Thierry, Jonathan Thieuleux
-
Analyzing iOS apps: road from AppStore to security analysis report
– Lenar Safin, Yaroslav Alexandrov, Egor Fominykh, Alexander Chernov, Katerina Troshina
-
miLazyCracker
– Kevin Larson
-
Baring the system
– Yuriy Bulygin, Oleksandr Bazhaniuk
-
Reverse engineering of file formats and network protocols using Kaitai Struct
– Mikhail Yakshin
-
Poutine: Dusting Forgotten Lore
– Yannick Lamarre
-
TBA
– Alex Ionescu
-
Harnessing Intel Processor Trace on Windows for fuzzing and dynamic analysis
– Andrea Allievi, Richard Johnson
-
Your Chakra Is Not Aligned 30min
– Natalie Silvanovich
-
Legacy Crypto Never Dies
– David Hulton
-
Teaching Old Shellcode New Tricks
– Josh Pitts
-
Reverse Engineering Satellite Based IP Content Distribution
– Taylor Jacob
-
Embedded devices reverse engineering
–Vitor Ventura, Vladan Nikolić
-
A Little Less Conversation, A Little More ActionScript
– WanderingGlitch
-
Contributor analysis
– Francisco Blas Izquierdo Riera (klondike)
-
Breaking Code Read Protection on the NXP LPC-family Microcontrollers
– Chris Gerlinsky