JAVA EVERY-DAYS: EXPLOITING SOFTWARE RUNNING ON 3 BILLION DEVICES
TLS 'SECRETS'
LAWFUL ACCESS PANEL
CLICKJACKING REVISITED: A PERCEPTUAL VIEW OF UI SECURITY
HIDING @ DEPTH - EXPLORING, SUBVERTING AND BREAKING NAND FLASH MEMORY
HONEY, I’M HOME!! - HACKING Z-WAVE HOME AUTOMATION SYSTEMS
ANDROID: ONE ROOT TO OWN THEM ALL
WHAT'S ON THE WIRE? PHYSICAL LAYER TAPPING WITH PROJECT DAISHO
EXPLOITING NETWORK SURVEILLANCE CAMERAS LIKE A HOLLYWOOD HACKER
OWNING THE ROUTING TABLE - PART II