02: You can run, but you can’t hide - Vlad Sabaka

04: Fun with Sam: Inside the Surface Aggregator Module - Alex Ionescu

03: Bochspwn Reloaded: Detecting Kernel Memory Disclosure with x86 Emulation and Taint Tracking - Mateusz “j00ru” Jurczyk

05: BinCAT: purrfecting binary static analysis - Philippe Biondi, Xavier Mehrenberger, Raphaël Rigo, Sarah Zennou

06: ZapZap! bangBang!i - Ang Cui, Rick Housley

07: Hacking Cell Phone Embedded Systems - Keegan Ryan

08: Exporting IDA Debug Information - Adam Schwalm

09: BASS Automated Signature Synthesizer - Mariano Graziano, Jonas Zaddach

10: The HyperV Architecture and its Memory Manager - Andrea Allievi

11: Bubble Struggle - Call Graph Visualization with Radare2 - Marion Marschalek

13: HDI PCB Netlist Recovery: a new (old) technique - David Carne

14: Miasm: reverse engineering framework - Fabrice Desclaux, Camille Mougey

15: FreeCalypso: a fully liberated GSM baseband - Mychaela Falconia

17: Crypton - Exposing malware’s deepest secrets - Julia karpin, Anna Dorfman

18: SGX Enclave programming: common mistakes - Michael Atlas

19: MazeWalker - Enriching static malware analysis - Yevgeniy Kulakov

20: The Life-Changing Magic of IDAPython: Embedded Device Edition - Maddie Stone

22: Reverse Engineering DSSS - Michael Ossmann

Lightning talks

90: LT 1 - Jeff Dileo - AssetHook

91: LT 2 - Frederic Marmond - REVEN Axion

92: LT 3 - John McMaster - Silicon Photonics