Monsters in the Middleboxes: Building Tools for Detecting HTTPS Interception
Hacking for the Greater Good: Empowering Technologists to Strengthen Digital Society
All the 4G Modules Could be Hacked
Finding a Needle in an Encrypted Haystack: Leveraging Cryptographic Abilities to Detect the Most Prevalent Attacks on Active Directory
Hunting for Bugs, Catching Dragons
Defense Against Rapidly Morphing DDOS
WebAuthn 101 - Demystifying WebAuthn
Project Zero: Five Years of "Make 0Day Hard"
Process Injection Techniques - Gotta Catch Them All
Predictive Vulnerability Scoring System
Critical Zero Days Remotely Compromise the Most Popular Real-Time OS
Hacking Ten Million Useful Idiots: Online Propaganda as a Socio-Technical Security Project
Breaking Samsung's ARM TrustZone