Hack.lu 2018: Education And Communication - Ange Albertini
Hack.lu 2018: Finding The Best TI Provider For A Specific Purpose - A. Hickey and D. Roecher
Hack.lu 2018: 14 Easy Lessons For Thinking About Complex Adversarial Systems - Eleanor Saitta
Hack.lu 2018: Serial-Killer: Security Analysis Of Industrial Serial Device Servers - Florian Adamsky
Hack.lu 2018: The Science Behind Social Engineering And An Effective Security Culture - E. Nicaise
Hack.lu 2018 LT: PKI Demo With Physical Locks - Gunstick
Hack.lu 2018: Bypassing ISP And Enterprise Anti-DDoS With 90's Technology - Dennis Rand
Hack.lu 2018: Trojans In SS7: How They Bypass All Security Measures - Sergey Puzankov
Hack.lu 2018: Digital Safety For Politically Vulnerable Organizations - Matt "Mateo" Mitchell
Hack.lu 2018: Mind The (Air)Gap - Erez Yalon and Pedro Umbelino
Hack.lu 2018: Take Your Path Normalization Off And Pop 0days Out! - Orange Tsai
Hack.lu 2018: IPC - The Broken Dream Of Inherent Security - Thanh Bui and Siddharth "Sid" Rao
Hack.lu 2018: Only An Electron Away From Code Execution - Silvia Väli
Hack.lu 2018: How We Trained The Dragon^W Classified APKs Via ANNs - Roman Graf and Aaron Kaplan
Hack.lu 2018: Real World: Threat Intelligence - Elle Armageddon
Hack.lu 2018: Simple Analysis Using pDNS - Irena Damsky ft. A. Dulaunoy, A. Kaplan & P. Vixie
Hack.lu 2018 LT: Bettercrypto Is Not Dead - Aaron and David
Hack.lu 2018: What The Fax?! - Eyal Itkin and Yaniv Balmas
Hack.lu 2018: How To Hack A Yacht - Swimming IoT - Stephan Gerling
Hack.lu 2018 LT: Unicorn Stuff From Pastes - Sami