The Life & Death of Kernel Object Abuse by Type Isolation - Saif ElSheri Ian Kronquist (@IanKronquist )
UEFI BIOS firmware analysis at scale - Oleksandr Bazhaniuk (@ABazhaniuk)
Kenya
Program Analysis on Smart Contracts - JP Smith, Trail Of Bits (@japesinator)
A Walk With Shannon: A walkthrough of a PWN2OWN Baseband exploit - Amat Cama, Independant (@amatcama)
Reversing the Octagon: Next-Gen Windows Security - Alex Ionescu, Dave Weston (@aionescu & @dwizzzleMSFT)
The Baseband Basics: Understanding, Debugging and Pwning the Mediatek Communication Processor - Nitay Artenstein, Charles Muiruri (@nitayart & @icrackthecode)
You and your research - Saif ElSherei (@Saif_Sherei)
2017
U.A.E.
Keynote 1 - Revisiting the state - Maarten Van Horenbeeck (@maartenvhb)
Keynote 2 - Wim Remes (@wimremes)
The Blackbox of DPAPI: the gift that keeps on giving - Bartosz Inglot (@BartInglot)
Transforming Open Source to Open Access in Closed Applications: Finding Vulnerabilities in Adobe Reader's XSLT Engine - Abdul-Aziz Hariri (@abdhariri), Jasiel Spelman (@WanderingGlitch), Brian Gorence
From mimikatz to kekeo, passing by new Microsoft security technologies - Benjamin Delpy (@gentilkiwi)
Agentless Post Exploitation on Device Guarded Systems - Christopher Truncer (@ChrisTruncer)
Security Research and Development with LLVM - Andrew Reiter (@andrew_opcde)