- Abusing Software Defined Networks
- Analyzing UEFI BIOSes from Attacker & Defender Viewpoints
- Android Kernel and OS Security Assessment with Iron Crow
- A Practical Attack Against VDI Solutions
- APTs Way: Evading Your EBNIDS
- Attacking the Linux PRNG on Android
- Blended Web and Database Attacks on Real-Time, In-Memory Platforms
- Bringing a Machete to the Amazon
- Bypassing HTTP Strict Transport Security
- C++11 Metaprogramming Applied to Software Obfuscation
- Cellular Exploitation on a Global Scale: The Rise and Fall of the Control Protocol
- Charge Your Device with the Latest Malware
- Counterfeiting the Pipes with FakeNet 2.0 (Part 1/2)
- Counterfeiting the Pipes with FakeNet 2.0 (Part 2/2)
- Don't Trust Your USB! How to Find Bugs in USB Device Drivers
- DTM Components: Shadow Keys to the ICS Kingdom
- Endrun - Secure Digital Communications for Our Modern Dystopia
- Evasion of High-End IDPS Devices at the IPv6 Era
- Exploring Yosemite: Abusing Mac OS X 10.10
- Firmware.RE: Firmware Unpacking, Analysis and Vulnerability-Discovery as a Service
- Freeze Drying for Capturing Environment-Sensitive Malware Alive
- Gyrophone: Eavesdropping Using a Gyroscope
- Hacking the Wireless World with Software Defined Radio - 2.0
- Hack Your ATM with Friend's Raspberry.Py
- Hadoop Security: Seven Ways to Kill an Elephant
- Hide Android Applications in Images
- Industrial Control Systems : Pentesting PLCs 101 (Part 1/2)
- Industrial Control Systems : Pentesting PLCs 101 (Part 2/2)
- Lessons Learned from Eight Years of Breaking Hypervisors
- Lights Off! The Darkness of the Smart Meters
- Man in the Binder: He Who Controls IPC, Controls the Droid
- Network Attached Shell: N.A.S.ty Systems that Store Network Accessible Shells
- Next Level Cheating and Leveling Up Mitigations
- PDF Attack: A Journey from the Exploit Kit to the Shellcode (Part 1/2)
- PDF Attack: A Journey from the Exploit Kit to the Shellcode (Part 2/2)
- Quantified Self - A Path to Self-Enlightenment or Just a Security Nightmare?
- Quantum Key Distribution and the Future of Encryption
- Reflected File Download - A New Web Attack Vector
- ret2dir: Deconstructing Kernel Isolation
- Revisiting XSS Sanitization
- Same Origin Method Execution (SOME) - Exploiting a Callback for Same Origin Policy Bypass
- Scala Security: Examining the Play and LiftWeb Frameworks
- Session Identifier are for Now, Passwords are Forever - XSS-Based Abuse of Browser Password Managers
- SSL Validation Checking vs. Go(ing) to Fail
- The Power of Pair: One Template that Reveals 100+ UAF IE Vulnerabilities
- Two Factor Failure
- WebKit Everywhere: Secure or Not?
- Welcome & Introduction to Black Hat Europe 2014