Bypassing the Maginot Line: Remotely Exploit the Hardware Decoder on Smartphone
Attacking Electric Motors for Fun and Profit
HTTP Desync Attacks: Smashing into the Cell Next Door
Chip.Fail - Glitching the Silicon of the Connected World
Hacking Your Non-Compete
Detecting Malicious Files with YARA Rules as They Traverse the Network
Woke Hiring Won't Save Us: An Actionable Approach to Diversity Hiring and Retention
100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans
API-Induced SSRF: How Apple Pay Scattered Vulnerabilities Across the Web
Practical Approach to Automate the Discovery and Eradication of Open-Source Software Vulnerabilities at Scale
Making Big Things Better the Dead Cow Way
The Discovery of a Government Malware and an Unexpected Spy Scandal
Moving from Hacking IoT Gadgets to Breaking into One of Europe's Highest Hotel Suites