Killing the Myth of Cisco IOS Diversity: Towards Reliable, Large-Scale Exploitation of Cisco IOS
Heap spray detection with Heap Inspector
IEEE Software Taggant System
The Troika of E-Discovery: Ethics, ESI, and Expertise in a Web 2.0 World
Overcoming IOS Data Protection to Re-enable iPhone Forensics
From Redmond with Love!
SSH as the next back door. Are you giving hackers root access?
The Ultimate Study of Real-Life SSL Issues
Function Rerouting from Kernel Land "Hades"
OAuth - Securing the Insecure
Familiarity Breeds Contempt: The Honeymoon Effect and the Role of Legacy Code in Zero-Day Vulns
Affiliate Programs: Legitimate Business or Fuelling Cybercrime?
PPI-Geolocation: The next generation of 802.11 visualization and geo-location