BASS Automated Signature Synthesizer Mariano Graziano, Jonas Zaddach
Bubble Struggle - Call Graph Visualization with Radare2 - Marion Marschalek
You can run, but you can’t hide - Vlad Sabaka
Crypton - Exposing malware’s deepest secrets - Julia karpin, Anna Dorfman
Reverse Engineering DSSS - Michael Ossmann
Exporting IDA Debug Information - Adam Schwalm
FreeCalypso: a fully liberated GSM baseband - Mychaela Falconia
POSTSCRIPT - FreeCalypso: a fully liberated GSM baseband - Mychaela Falconia
Hacking Cell Phone Embedded Systems -Keegan Ryan
The Life-Changing Magic of IDAPython: Embedded Device Edition - Maddie Stone
MazeWalker - Enriching static malware analysis - Yevgeniy Kulakov
Miasm: reverse engineering framework - Fabrice Desclaux, Camille Mougey
ZapZap! bangBang! - Ang Cui, Rick Housley
Digging Into The Core Of Boot - Yuriy Bulygin, Oleksandr Bazhaniuk
APT3 Uncovered - The code evolution of Pirpi - Micah Yates
SGX Enclave Programming - Common Mistakes - Michael Atlas * Github