Drivesploit: Circumventing both automated AND manual drive-by-download detection
Balancing the Pwn Trade Deficit
Social Networking Special Ops: Extending Data Visualization Tools for faster Pwnage
Finger Pointing for Fun, Profit and War?
Getting In Bed With Robin Sage
Breaking Browsers: Hacking Auto-Complete
Microsoft Powershell - It's time to own
You Will be Billed $90,000 for This Call
Elevation of Privilege: The Easy way to Threat Model
ISC SIE Passive DNS vs. Apache Cassandra
Reverse Engineering with Hardware Debuggers
Hadoop Security Design? Just Add Kerberos? Really?
SpewPAL: How capturing and replaying attack traffic can save your IDS
The Black Art of Binary Hijacking
Lifting the Fog
Security is Not a Four Letter Word
USB - HID, The Hacking Interface Design