8:1 Please stand; now, please be seated8:2 Witches, Warlocks, and Wassenaar8:3 Compiler Bug Backdoors8:4 A Protocol for Leibowitz8:5 Jiggling into a New Attack Vector8:6 Hypervisor Exploit, Five Years Old8:7 Stegosploit8:8 On Error Resume Next8:9 Unbrick My Part8:10 Backdoors up my Sleeve8:11 Naughty Signals8:12 Weird Crypto