HTTP/2 & QUIC - Teaching Good Protocols To Do Bad Things
Exploiting Curiosity and Context: How to Make People Click on a Dangerous Link Despite Their Security Awareness
HEIST: HTTP Encrypted Information can be Stolen Through TCP-Windows
1000 Ways to Die in Mobile OAuth
Using EMET to Disable EMET
Cyber War in Perspective: Analysis from the Crisis in Ukraine
Samsung Pay: Tokenized Numbers Flaws and Issues
The Art of Defense - How Vulnerabilities Help Shape Security Features and Mitigations in Android
Hacking Next-Gen ATMs: From Capture to Cashout
Weaponizing Data Science for Social Engineering: Automated E2E Spear Phishing on Twitter
Web Application Firewalls: Analysis of Detection Logic
Using an Expanded Cyber Kill Chain Model to Increase Attack Resiliency
Using Undocumented CPU Behavior to See into Kernel Mode and Break KASLR in the Process