- Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts by Nitesh Dhanjani
- Advanced JPEG Steganography and Detection by John Ortiz
- AIS Exposed. Understanding Vulnerabilities and Attacks 2.0 by Marco Balduzzi
- Beyond ‘Check The Box’: Powering Intrusion Investigations by Jim Aldridge
- Black Hat Asia 2014 - Dude, WTF in My CAN!
- Black Hat Asia 2014 - Keynote by Dr. Steve Crocker
- Black Hat Asia 2014 - Persist It: Using and Abusing Microsoft's Fix It Patches
- Black Hat Asia 2014 - The Machines That Betrayed Their Masters
- Black Hat Asia 2014 - Z:MAKE TROYNOT WAR: Case Study of the Wiper APT in Korea, and Beyond
- Building Trojan Hardware at Home by JP Dunning
- Comprehensive Virtual Appliance Detection by Kang Li
- Disasters in the Making: How I Torture Open Government Data Systems for Fun, Profit, and Time Travel
- Discovering Debug Interfaces with the JTAGulator Part 1 by Joe Grand
- Discovering Debug Interfaces with the JTAGulator Part 2 by Joe Grand
- Diving Into IE 10’s Enhanced Protected Mode Sandbox by Mark Vincent Yason
- Dude, WTF in My CAN! by Alberto Garcia Illera & Javier Vazquez Vidal
- I Know You Want Me - Unplugging PlugX by Takahiro Haruyama & Hiroshi Suzuki
- JS Suicide: Using JavaScript Security Features to Kill JS Security by Ahamed Nafeez
- OFFENSIVE: Exploiting DNS Servers Changes by Leonardo Nve
- Owning a Building: Exploiting Access Control and Facility Management Systems by Billy Rios
- PDF Attack: A Journey From the Exploit Kit to the Shellcode Part 1 by Jose Miguel Esparza
- PDF Attack: A Journey From the Exploit Kit to the Shellcode Part 2 by Jose Miguel Esparza
- Persist It: Using and Abusing Microsoft’s Fix It Patches by Jon Erickson
- Privacy-by-Design for the Security Practitioner by Richard Chow
- [Private Video]
- SAP, Credit Cards, and the Bird That Knows Too Much by Ertunga Arsal
- Say It Ain’t So - An Implementation of Deniable Encryption by Ari Trachtenberg
- Scan All the Things - Project Sonar by Mark Schloesser
- Solutum Cumulus Mediocris by Eldar Marcussen
- The Inner Workings of Mobile Cross-Platform Technologies by Simon Roses Femerling
- The Machines That Betrayed Their Masters by Glenn Wilkinson
- Tomorrow’s News is Today’s Intel: Journalists as Targets and Compromise Vectors by Shane Huntley
- UI Redressing Attacks on Android Devices Revisited by Marcus Niemietz
- Ultimate Dom Based XSS Detection Scanner on Cloud by Nera W. C. Liu & Albert Yu
- USB Attacks Need Physical Access Right? Not Any More… by Andy Davis
- You Can’t See Me: A Mac OS X Rootkit Uses the Tricks You Haven’t Known Yet
- Z:Make Troy, Not War: Case Study of the Wiper APT in Korea, and Beyond by Kyle Yang