Detecting Deep Fakes with Mice
Dragonblood: Attacking the Dragonfly Handshake of WPA3
I'm Unique, Just Like You: Human Side-Channels and Their Implications for Security and Privacy
Look, No Hands! -- The Remote, Interaction-less Attack Surface of the iPhone
Arm IDA and Cross Check: Reversing the Boeing 787's Core Network
Going Beyond Coverage-Guided Fuzzing with Structured Fuzzing
On Trust: Stories from the Front Lines
Breaking Through Another Side: Bypassing Firmware Security Boundaries from Embedded Controller
Breaking Encrypted Databases: Generic Attacks on Range Queries
Exploiting Qualcomm WLAN and Modem Over The Air
Securing the System: A Deep Dive into Reversing Android Pre-Installed Apps
Securing Apps in the Open-By-Default Cloud
Exploring the New World : Remote Exploitation of SQLite and Curl