WITH BIGDATA COMES BIG RESPONSIBILITY: PRACTICAL EXPLOITING OF MDX INJECTIONS
POWER ANALYSIS ATTACKS FOR CHEAPSKATES
FACT AND FICTION: DEFENDING YOUR MEDICAL DEVICES
MALTEGO TUNGSTEN AS A COLLABORATIVE ATTACK PLATFORM
BINARYPIG - SCALABLE MALWARE ANALYTICS IN HADOOP
ABUSING WEB APIS THROUGH SCRIPTED ANDROID APPLICATIONS
BIG DATA FOR WEB APPLICATION SECURITY
DISSECTING CSRF ATTACKS & COUNTERMEASURES
ABOVE MY PAY GRADE: CYBER RESPONSE AT THE NATIONAL LEVEL
VIRTUAL DEOBFUSCATOR - A DARPA CYBER FAST TRACK FUNDED EFFORT
TERIDIAN SOC EXPLOITATION: EXPLORATION OF HARVARD ARCHITECTURE SMART GRID SYSTEMS