The Hidden Architecture of our Time: Why This Internet Worked How We Could Lose It and the Role Hackers Play
Abusing Bleeding Edge Web Standards for AppSec Glory
Hackproofing Oracle eBusiness Suite
Drone Attacks on Industrial Wireless: A New Front in Cyber Security
An Insider's Guide to Cyber-Insurance and Security Guarantees
Design Approaches for Security Automation
Watching Commodity Malware Get Sold to a Targeted Actor
Dark Side of the DNS Force
CANCELLED - How to Build the Immune System for the Internet
The Remote Malicious Butler Did It!
Demystifying the Secure Enclave Processor
Hardening AWS Environments and Automating Incident Response for AWS Compromises
Iran's Soft-War for Internet Dominance
Breaking Hardware-Enforced Security with Hypervisors
An AI Approach to Malware Similarity Analysis: Mapping the Malware Genome With a Deep Neural Network