Industrial Bug Mining - Extracting, Grading and Enriching the Ore of Exploits
Virtual Forensics
Network Stream Debugging with Mallory
JavaSnoop: How to Hack Anything Written in Java
Exploiting the Forest with Trees
pyREtic – Reversing obfuscated Python bytecode & live Python objects
Voyage of the Reverser: A Visual Study of Binary Species
TitanMist: Your First Step to Reversing Nirvana
NEPTUNE: Dissecting Web-based Malware via Browser and OS Instrumentation
Goodware drugs for malware: on-the-fly malware analysis and containment