Attacks on SAP HANA Platform
|
Juan Perez-Etchegoyen
|
Saving Nostalgia: Modding an Old Z80 Computer
|
Graham Sutherland
|
Advanced incident remediation techniques
|
|
Trusts you might have missed
|
Will Schroeder
|
Data protection, privacy and cloud computing: navigating legal compliance
|
|
Not only frogs can hop
|
Daniel Compton
|
Jittery MacGyver: Lessons Learned from Building a Bionic Hand out of a Coffee Maker
|
Evan Booth
|
The Malware CAPE: Automated Extraction of Configuration and Payloads from Sophisticated Malware
|
|
What it Means to Have the C Word in the National Security Agenda
|
Emil Tan
|
Bootstrapping an Architectural Research Platform
|
Jacob Torrey
|
Light at the End of the Tunnel. (Hope for Team Defence)
|
Haroon Meer
|
The Frugal Girl’s Guide to Threat Intelligence
|
Rebekah Brown
|
Frictionless Security
|
Jerry Gamblin
|
101 Ways To Brick Your Hardware
|
Joe FitzPatrick
|
2016: The Infosec Crossroads
|
Saumil Shah
|
Leverage One-shot UAF to a Minigun
|
|
Three decades in security. What’s changed, and what hasn’t.
|
Robert Schifreen
|
Universal Serial aBUSe: Remote Physical Access Attacks
|
Rogan Dawes
|