44:54 Dimitrios Tatsis Attacking Hexagon Security Analysis of Qualcomm's ADSP lxNbsl2gW7w0e All Hacking Cons
54:35 Matt Graeber Using WPP and TraceLogging Tracing to Facilitate Dynamic and Static Windows RE 4wrctkSI All Hacking Cons
41:38 Thomas Roth Dmitry Nedospasov Hacking the most popular cryptocurrency hardware wallets 90dZWqWdV43 All Hacking Cons
49:33 Juan Andres Guerrero Saade Mining Disputed territories Studying Attacker Signatures for Improved Sit All Hacking Cons
1:03:49 Joan Calvet The long journey To A MultiArchitecture Disassembler fgmt6TlB2UkKi All Hacking Cons
26:06 Colin O'Flynn MINimum Failure Stealing Bitcoins with Electromagnetic Fault Injection 5qYAlMcGKMoEb All Hacking Cons
27:53 Evan Jensen The Backdoor Foundry A Tool chain for Building Application Specific Implants TU4e6qaSW6H All Hacking Cons