BEYOND THE APPLICATION: CELLULAR PRIVACY REGULATION SPACE
LEGAL CONSIDERATIONS FOR CELLULAR RESEARCH
A TALE OF ONE SOFTWARE BYPASS OF WINDOWS 8 SECURE BOOT
I CAN HEAR YOU NOW: TRAFFIC INTERCEPTION AND REMOTE MOBILE PHONE CLONING WITH A COMPROMISED CDMA FEMTOCELL
BUYING INTO THE BIAS: WHY VULNERABILITY STATISTICS SUCK
OPSEC FAILURES OF SPIES
HOW CVSS IS DOSSING YOUR PATCHING POLICY (AND WASTING YOUR MONEY)
BLUETOOTH SMART: THE GOOD, THE BAD, THE UGLY, AND THE FIX!
UART THOU MAD?
PRESS ROOT TO CONTINUE: DETECTING OSX AND WINDOWS BOOTKITS WITH RDFU
SSL, GONE IN 30 SECONDS - A BREACH BEYOND CRIME
MULTIPLEXED WIRED ATTACK SURFACES