ClickOnce and You're in - When Appref-ms Abuse is Operating as Intended
Exploiting the Hyper-V IDE Emulator to Escape the Virtual Machine
The Path Less Traveled: Abusing Kubernetes Defaults
Come Join the CAFSA - Continuous Automated Firmware Security Analysis
Internet-Scale Analysis of AWS Cognito Security
MINimum Failure - Stealing Bitcoins with Electromagnetic Fault Injection
Mobile Interconnect Threats: How Next-Gen Products May be Already Outdated
Playing Offense and Defense with Deepfakes
Women in Security: Building a Female InfoSec Community in Korea, Japan, and Taiwan
Infighting Among Russian Security Services in the Cyber Sphere
Automation Techniques in C++ Reverse Engineering
Adventures in the Underland: The CQForensic Toolkit as a Unique Weapon Against Hackers
Paging All Windows Geeks – Finding Evil in Windows 10 Compressed Memory