Breaking Browsers: Hacking Auto-Complete
Microsoft Powershell - It's time to own
You Will be Billed $90,000 for This Call
Elevation of Privilege: The Easy way to Threat Model
Reverse Engineering with Hardware Debuggers
ISC SIE Passive DNS vs. Apache Cassandra
Hadoop Security Design? Just Add Kerberos? Really?
SpewPAL: How capturing and replaying attack traffic can save your IDS
The Black Art of Binary Hijacking
Lifting the Fog
Security is Not a Four Letter Word
USB - HID, The Hacking Interface Design