40:52
Introducing CSE’s open source AssemblyLine (Steve Garon & John O’Brien)
Hackfest Communication
36:46
Practical Analysis of Awareness (Kendra Coooley)
41:45
Superhéros Tous! Comment l’empathie peut aider l’inclusion des personnel avec ASD-ADHD (Michelle)
43:32
Creating a Professional-Quality Embedded Device on a Budget (Michael Vieau & Kevin Bong)
1:02:34
Banking on Insecurity: Why Attackers Can Take the Money and Run (Cheryl Biswas)
38:01
Between You and Me and the Network Security Boundary (Patrick Fussell)
17:48
100 Facebooks accounts per day through internet searches (Guillermo Buendia & Yael Basurto)
55:10
Stantinko : Un botnet aux multiples facettes (Matthieu Faou & Frédéric Vachon)
52:06
Vaccination - An Anti-Honeypot Approach (Gal Bitensky)
17:38
Élection présidentielle Française 2 0 (Damien Bancal)
40:12
SniffAir – OpenSource Framework for WiFi Security Assessments (Matthew Eidelberg & Steven Daracott)
51:55
BITSInject - control your BITS, get SYSTEM (Dor Azouri)
46:55
Rage Against the Weaponized A.I. Propaganda Machine (Chris Sumner)
45:54
Dissecting a Metamorphic File-Infecting Ransomware (Raul Alvarez)
39:38
Genetic Algorithms for Brute Forcing (Christopher Ellis)
51:07
Selenium: dark side of the moon (Adam Reiser)
52:31
Lessons Learned Hunting IoT Malware (Olivier Bilodeau)
48:21
Attack Driven Development: Getting Started in Application Security (Keith Hoodlet)
1:05:35
How To Pwn an Enterprise in 2017 (or 2016, or 2015. . .) (Johnny Xmas)
45:22
Fingerprinting Android malware packaging thru static analysis identify creator (François Gagnon)
24:20
Les véhicules autonomes, leur télémétrie et l’impact sur la sécurité (Marc-André Bélanger)
49:56
Hadoop safari : Hunting for vulnerabilities (Mahdi Braik & Thomas Debize)
39:48
The Black Art of Wireless Post-Exploitation (Gabriel Ryan)
52:26
Static-Analysis Tools: Now you’re Playing with Power! (Philippe Arteau)
59:53
Propriétés des preuves numériques et considérations à leur cueillette (Sylvain Desharnais)