Best Cryptographic Attack

Video-based cryptanalysis: Extracting Cryptographic Keys from Video Footage of a Device’s Power LED


Best Desktop Bug

CountExposure!


Best Privilege Escalation Bug

URB Excalibur: Slicing Through the Gordian Knot of VMware VM Escapes


Best Remote Code Execution Bug

ClamAV RCE


Best Song

Clickin’


Epic Achievement

Clement Lecigne: 0-days hunter world champion


Lamest Vendor Response

Three Lessons From Threema: Analysis of a Secure Messenger


Lifetime Achievement Award

Mudge


Most Epic Fail

“Holy fucking bingle, we have the no fly list,”


Most Innovative Research

Inside Apple’s Lightning: Jtagging the iPhone for Fuzzing and Profit


Most Under-Hyped Research

Activation Context Cache Poisoning