o-checker : Malicious document file detection tool - Malicious feature can be detected based on file size by Yuuhei Ootsubo
IDA Vulnerabilities and Bug Bounty by Masaaki Chida
Keynote:CTF: All the Cool Kids are doing it by Chris Eagle
A Security Barrier Device That Can Protect Critical Data Regardless of OS or Applications by Just Installing It. by Keiji Toda
The Current State of Automotive Security by Chris Valasek
libinjection: from SQLi to XSS by Nick Galbreath
Preventing hard disk firmware manipulation attack and disaster recovery by Dai Shimogaito
HTML5 Security & Headers - X-Crawling-Response-Header - by Tomoyuki Shigemori
Keynote : CODE BLUE in the ICU! by Jeff Moss
SCADA Software or Swiss Cheese Software? by Celil UNUVER
various tricks for remote linux exploits by Seok-Ha Lee (wh1ant)
Secret of Intel Management Engine by Igor Skochinsky
CODE BLUE 2014 : BadXNU, A rotten apple! by PEDRO VILAÇA
CODE BLUE 2014 : Persisted: The active use and exploitation of Microsoft's Application Compatibility Framework by JON ERICKSON
CODE BLUE 2014 : [Keynote] IDA and digital security by Ilfak Guilfanov
CODE BLUE 2014 : How I Hacked My Home by David Jacoby
CODE BLUE 2014 : Drone attack by malware and network hacking by DONGCHEOL HONG
CODE BLUE 2014 : Microsoft Vulnerability Research: How to be a Finder as a Vendor by DAVID SEIDMAN
CODE BLUE 2014 : how to avoid the Detection by Malware by HIROSHI SNINOTSUKA
CODE BLUE 2014 : Embedded Security in The Land of the Rising Sun by BEN SCHMIDT & PAUL MAKOWSKI