Recordings
02: You can run, but you can’t hide - Vlad Sabaka
04: Fun with Sam: Inside the Surface Aggregator Module - Alex Ionescu
06: ZapZap! bangBang!i - Ang Cui, Rick Housley
07: Hacking Cell Phone Embedded Systems - Keegan Ryan
08: Exporting IDA Debug Information - Adam Schwalm
09: BASS Automated Signature Synthesizer - Mariano Graziano, Jonas Zaddach
10: The HyperV Architecture and its Memory Manager - Andrea Allievi
11: Bubble Struggle - Call Graph Visualization with Radare2 - Marion Marschalek
13: HDI PCB Netlist Recovery: a new (old) technique - David Carne
14: Miasm: reverse engineering framework - Fabrice Desclaux, Camille Mougey
15: FreeCalypso: a fully liberated GSM baseband - Mychaela Falconia
17: Crypton - Exposing malware’s deepest secrets - Julia karpin, Anna Dorfman
18: SGX Enclave programming: common mistakes - Michael Atlas
19: MazeWalker - Enriching static malware analysis - Yevgeniy Kulakov
20: The Life-Changing Magic of IDAPython: Embedded Device Edition - Maddie Stone
22: Reverse Engineering DSSS - Michael Ossmann
Lightning talks
90: LT 1 - Jeff Dileo - AssetHook