METHODOLOGIES FOR HACKING EMBEDDED SECURITY APPLIANCES
PDF ATTACK: A JOURNEY FROM THE EXPLOIT KIT TO THE SHELLCODE
TOWN HALL MEETING: CFAA REFORM STRATEGY
DO-IT-YOURSELF CELLULAR IDS
JTAGULATOR: ASSISTED DISCOVERY OF ON-CHIP DEBUG INTERFACES