COMBATING THE INSIDER THREAT AT THE FBI: REAL WORLD LESSONS LEARNED
JUST-IN-TIME CODE REUSE: THE MORE THINGS CHANGE, THE MORE THEY STAY THE SAME
BIOS SECURITY
TOR... ALL-THE-THINGS!
TRUNCATING TLS CONNECTIONS TO VIOLATE BELIEFS IN WEB APPLICATIONS
ROOTING SIM CARDS
FULLY ARBITRARY 802.3 PACKET INJECTION: MAXIMIZING THE ETHERNET ATTACK SURFACE
REVEALING EMBEDDED FINGERPRINTS: DERIVING INTELLIGENCE FROM USB STACK INTERACTIONS
FUNDERBOLT: ADVENTURES IN THUNDERBOLT DMA ATTACKS
RFID HACKING: LIVE FREE OR RFID HARD
HOME INVASION V2.0 - ATTACKING NETWORK-CONTROLLED HARDWARE