Legal GNSS Spoofing and its Effects on Autonomous Vehicles
PicoDMA: DMA Attacks at Your Fingertips
Sensor and Process Fingerprinting in Industrial Control Systems
Worm Charming: Harvesting Malware Lures for Fun and Profit
Messaging Layer Security: Towards a New Era of Secure Group Messaging
Transparency in the Software Supply Chain: Making SBOM a Reality
Testing Your Organization's Social Media Awareness
Rough and Ready: Frameworks to Measure Persistent Engagement and Deterrence
Rogue7: Rogue Engineering-Station Attacks on S7 Simatic PLCs
Zombie Ant Farming: Practical Tips for Playing Hide and Seek with Linux EDRs
Towards Discovering Remote Code Execution Vulnerabilities in Apple FaceTime
HostSplit: Exploitable Antipatterns in Unicode Normalization
Debug for Bug: Crack and Hack Apple Core by Itself - Fun and Profit to Debug and Fuzz Apple Kernel by lldb Script