CanSecWest 2016
Let's Talk about WiFi - Dragos Ruiu
Exploits, 0days, and Bug Bounties - Nicolas Joly, Microsoft
BadWinmail and Email Security - Haifei Li + Chong Xu, Intel Security
WAVE YOUR FALSE FLAGS! - Deception Tactics Muddying Attribution in Targeted Attacks - Brian Bartholomew + Juan Andres Guerrero-Saade, Global Research and Analysis Team (GReAT), Kaspersky Lab
APT Reports and OPSEC Evolution: These are not the APT reports you are looking for - Gadi Evron / Sysman, Cymmetria
Bypassing application whitelisting in critical infrastructures - Rene Freingruber, SEC Consult Unternehmensberatung GmbH
Hardsploit project : All-In-One Tool for Hardware Security Audit - Julien MOINARD, Opale Security
Having fun with secure messengers and Android Wear - Artem Chaykin, Positive Technologies
Sandbox Escape with Generous Help from Security Software - Chuanda Ding, Tencent Xuanwu Lab
Getting Physical: Extreme abuse of Intel based Paging Systems - Nicolas Economou + Enrique Elias Nissim, Core Security Technologies
Execute My Packet (Exodus of Shells from a Firewall) - Alex Wheeler + Jordan Gruskonvjak, Exodus Intelligence
Attack and defense toolkits in High/Low frequency - Haoqi Shan + Qing Yang, Qihoo 360 Unicorn Team
Pwn a Nexus device with a single vulnerability - Guang Gong, Qihoo 360
Virtualization device emulator testing technology - Qinghao Tang, Qihoo 360 Marvel Team
Docker Escape Technology - Shengping Wang, Qihoo 360 Marvel Team
Bypassing Different Defense Schemes via Crash Resistant Probing of Address Space - Robert Gawlik, Ruhr University Bochum
Automatic Binary Constraint Solving: Automatic Exploit Generation - Sophia D'Antoine, Trail of Bits
Don't Trust Your Eye: Apple Graphics Is Compromised! - Liang Chen + Marco Grassi + Qidan He, Keen Labs Tencent
High Performance Zero Knowledge Binary Hooking and Tracing with ROP Hooks - with A-Trace (Eh-Trace) - Shane "K2" Macaulay, IOActive
Smart Wars: Attacking Smart Locks with a Smart Phone - Song Li, 0XiD LLC