Your Chakra Is Not Aligned - Natalie Silvanovich

Hackable Security Modules Reversing and exploiting a FIPS 140-2 lvl 3 HSM firmware - Fotis Loukos

Reverse Engineering Satellite Based IP Content Distribution - Taylor Jacob

Harnessing Intel Processor Trace on Windows for fuzzing and dynamic analysis - Andrea Allievi, Richard Johnson

Contributor analysis - Francisco Blas Izquierdo Riera (Klondike)

http://klondike.es/charlas/contributor/

GRAP: define and match graph patterns within binaries - Aurelien Thierry, Jonathan Thieuleux

r2m2 - Guillaume “guedou” Valadon

Breaking Code Read Protection on the NXP LPC-family Microcontrollers - Chris Gerlinsky

Teaching Old Shellcode New Tricks - Josh Pitts

Analyzing iOS apps: road from AppStore to security analysis report - Lenar Safin, Yaroslav Alexandrov, Egor Fominykh, Alexander Chernov

miLazyCracker Kevin Larson

Legacy Crypto Never Dies - David Hulton

Embedded devices reverse engineering - Vitor Ventura, Vladan Nikolić