- Opening Remarks, Rumblings, Ruminations, and Rants
- U2F Zero: Secure Hardware Design, DIY Mass Production, and Amazon Prime
- Conor Patrick
- 35 Years of Cyberwar: The Squirrels are Winning
- Space Rogue
- Implantable Logic Analyzers and Unlocking Doors
- Kenny McElroy
- Cyborg Self-Hacking: An Examination of Cochlear Implants
- Jeff Dodge
- Introducing Jak: Safely Share Sensitive Files via Git
- Chris DiLorenzo
- Can a Drunk Person Authenticate Using Brainwaves? #NotAlcoholicsJustResearchers
- Tommy Chin
- Peter Muller
- Keynote Seven Things: Frank Zappa, T. Coraghassen Boyle, and Twenty-one Years in Security
- Dr. Gary McGraw
- So You Want to Hack Radios
- Marc Newlin
- Matt Knight
- Exploring The Infrared World
- Dominic Spill
- Michael Ossmann
- A Context-Aware Kernel IPC Firewall for Android
- David Wu
- Sergey Bratus
- WaveConverter – An Open Source Software Tool for RF Reverse Engineering
- Paul Clark
- I Have a Graph Database. Now What?
- Nicolas Kseib
- Shimon Modi
- 0wn the Con
- The Shmoo Group
- User Focused Security at Netflix: Stethoscope
- Andrew White
- Jesse Kriss
- ripr – Run Slices of Binary Code from Python
- Patrick Biernat
- Safety Bot Guaranteed
- Rich Seymour
- (In-)secure messaging with SCIMP and OMEMO
- Sebastian Verschoor
- LangSec for Penetration Testing: How and Why
- Falcon Darkstar Momot
- Sergey Bratus
- Know Normal, Find Evil: Windows 10 Edition
- Jake Williams
- Who Wants to Allow Arbitrary Code Execution on Their Boxes? We Do It Every Day.
- Brian Redbeard
- Brad Ison
- Goodnight Moon & the House of Horrors: A look at the current IoT ecosystem and the regulations trying to control it
- Whitney Merrill
- Aaron Alva
- Plug-in Electric Vehicle Fingerprinting: Authentication for Plug-in Electric Vehicles
- Rebekah Houser
- Defeating Sandbox Evasion: How to Increase Successful Emulation Rate in Your Virtualized Environment
- Alexander Chailytko
- Stanislav Skuratovich
- Anti-Ransomware: Turning the Tables
- Gal Shpantzer
- G. Mark Hardy
- Dig Out Your Brick Phone! Bringing AMPS Back with GNU Radio
- Brandon Creighton
- Excuse me, Server, Do You Have the Time?
- Brian Cardinale
- Does a BEAR Leak in the Woods? The Democratic National Committee breach, Russian APTs, and the 2016 U.S. Election
- Toni Gidwani
- A Widening Attack Plain: Threatcasting Tomorrow’s Threats
- Brian David Johnson
- Natalie Vanatta
- Ask the Feds
- Allan Friedman
- Nick Leiserson
- Eric Mill
- Jessica Wilkerson
- Ask the EFF: Protecting Tomorrow
- Kurt Opsahl
- Andrew Crocker
- háček: Computing a Hacker Experience
- Allison Miller
- Melissa Clarke
- Margaret Schedel
- Flailing is Learning: My First Year as a Malware Analyst
- Lauren Pearce
- The State of Secure Messaging
- Nikita Borisov
- Sze Chuen Tan
- The Metadata is the Message (and Sometimes the Message is the Metadata
- Matt Blaze
- A Nickel Tour of the Ad Fraud Ecosystem
- Ryan Castellucci
- The Threat Intel Results are in… You are NOT the hacker! : Disinformation Campaigns vs. Attribution Claims
- Mark Kuhr
- Challenges and Opportunities: Application Containers and Micro Services
- Anil Karmel
- Andrew Wild
- Designing and Executing the Worldís First All-Computer Hacking Competition: A panel with the development team
- Tim Vidas
- Chris Eagle
- Jason Wright
- Brian Caswell
- Mike Thompson
- Holt Sorenson