LESSONS FROM SURVIVING A 300GBPS DENIAL OF SERVICE ATTACK
WHAT SECURITY RESEARCHERS NEED TO KNOW ABOUT ANTI-HACKING LAW
LEGAL ASPECTS OF FULL SPECTRUM COMPUTER NETWORK (ACTIVE) DEFENSE
A PRACTICAL ATTACK AGAINST MDM SOLUTIONS
PIXEL PERFECT TIMING ATTACKS WITH HTML5
MOBILE ROOTKITS: EXPLOITING AND ROOTKITTING ARM TRUSTZONE
THE OUTER LIMITS: HACKING THE SAMSUNG SMART TV
OUT OF CONTROL: DEMONSTRATING SCADA DEVICE EXPLOITATION
COMPROMISING INDUSTRIAL FACILITIES FROM 40 MILES AWAY
HACKING LIKE IN THE MOVIES: VISUALIZING PAGE TABLES FOR LOCAL EXPLOITATION