Topics:
Topics of interest include, but are not limited to the following:
- 0days and New Attack Techniques
- New Exploit Mitigation Techniques
- Network Protocols, Analysis and Attacks
- Side Channel Analysis of Hardware Devices
- Analysis of Malicious Code / Viruses / Malware
- Hardware based attacks and reverse engineering
- Windows / Linux / OS X / *NIX Security Vulnerbilities
- Artificial Intelligence / Machine Learning Vulnerabilities
- NFC, WLAN, GPS, Satellite, RFID, Bluetooth and other wireless technologies
- Anything hackery and cool 🙂