Best Client-Side Bug

RCE on Samsung Phones via MMS

Remote Memory Corruption Bug in MacOS Bluetooth

Zero-Click iMessage Exploit


Best Cryptographic Attack

Cellebrite Good Times, Come On

Raccoon Attack

TPM Fail: TPM Meets Timing and Lattice Attacks

The Curious Case of WebCrypto Diffie-Hellman on Firefox – Small Subgroups Key Recovery Attack on Diffie-Hellman

Zerologon


Best Privilege Escalation Bug

Exploiting the Wi-Fi Stack on the Tesla Model S

Exploiting the “noowners” Flag – APFS Privilege Escalation

Pulse Connect Secure, Pulse Policy Secure, Pulse Secure Desktop Client RCE

Qualys Security Advisory Team

Windows ALPC Elevation of Privilege Vulnerability

Zerologon

ZombieVPN, Breaking That Internet Security

checkm8 – Epic JailBreak


Best Server-Side Bug

BraveStarr – A Fedora 31 netkit telnetd remote exploit

Dabman & Imperial (i&d) – Multiple Vulnerabilities

HAProxy: Out-of-Bounds Write in HTTP2 HPACK Dynamic Table

Qualys Security Advisory Team

RCE in OpenSMTPD

Remote Code Execution in Citrix ADC

Remote Code Execution in qmail


Best Song

5G ft. ytcracker

Confessions of a Hacker known as Kingpin – Joe Grand Story

Dark Web

I Will Survive

KJC Mixtape

Lady Ada – Powertrace (Pokerface Song Parody / PLATYPUS Paper Teaser)

R57

Very Serious Problems (The Internet Has Problems)

WHO DO YOU WORK FOR


Epic Achievement

Andy Gill

Ben Nassi, Yaron Pirutin, Adi Shamir, Yuval Elovici, Boris Zadov

David Wang, Stanislaw Skowronek

Evilsocket and pwnagotchi contributors

French Police

Graham Clark

Guang Gong

Matthew Bergin (Level)

Qualys Security Advisory Team

axi0mX


Lamest Vendor Response

CHAL-TEC GmbH, aka Electronic Star, aka Auna

Daniel J. Bernstein

Giggle

IBM

Intel Corporation

Open Source Security, Inc – grsecurity/PaX

Trend Micro

WECON Technology Co., Ltd.


Most Epic Fail

BlackHat

KuCoin

Microsoft

NCC Group

Oracle WebLogic Server c/o Oracle

Twitter

Windows Defender c/o Microsoft


Most Innovative Research

BaseSAFE: Baseband SAnitized Fuzzing through Emulation

DNS Cache Poisoning Attack Reloaded

Hidden Propery Abusing in Node.js

How to Exfiltrate Internal Information Using Web Proxies

InternalBlue, Spectra, ToothPicker, Frankenstein

Lamphone

NetCAT: Practical Cache Attacks from the Network.

TRRespass: When Memory Vendors Tell You Their Chips Are Rowhammer-free, They Are Not.

Vancouver Hospitals Pager Breach

Web Cache Deception in the Wild


Most Under-Hyped Research

Cellebrite Good Times, Come On

Cisco Adaptive Security Appliance Vulnerabilities

LimitedResults

Vulnerabilities in System Management Mode (SMM) and Trusted Execution Technology (TXT)