Can You Trust Me Now? An Exploration into the Mobile Threat Landscape
Applied Machine Learning for Data Exfil and Other Fun Topics
CANSPY: A Platform for Auditing CAN Devices
Recover a RSA Private Key from a TLS Session with Perfect Forward Secrecy
Viral Video - Exploiting SSRF in Video Converters
Side-Channel Attacks on Everyday Applications
Blunting the Phisher's Spear: A Risk-Based Approach for Defining User Training and Awarding Administrative Privileges
Windows 10 Segment Heap Internals
Language Properties of Phone Scammers: Cyberdefense at the Level of the Human
Horse Pill: A New Type of Linux Rootkit
Pangu 9 Internals
Timing Attacks Have Never Been So Practical: Advanced Cross-Site Search Attacks
Call Me: Gathering Threat Intelligence on Telephony Scams to Detect Fraud