A Retrospective on the Use of Export Cryptography
Measuring Adversary Costs to Exploit Commercial Software: The Government- Bootstrapped Non-Profit C.I.T.L.
GATTacking Bluetooth Smart Devices - Introducing a New BLE Proxy Tool
I Came to Drop Bombs: Auditing the Compression Algorithm Weapon Cache
GreatFET: Making GoodFET Great Again
AVLeak: Fingerprinting Antivirus Emulators for Advanced Malware Evasion
What's the DFIRence for ICS?
Defense at Hyperscale: Technologies and Policies for a Defensible Cyberspace
The Tao of Hardware the Te of Implants
SGX Secure Enclaves in Practice: Security and Crypto Review
Breaking FIDO: Are Exploits in There?
DPTrace: Dual Purpose Trace for Exploitability Analysis of Program Crashes
Dangerous Hare: Hanging Attribute References Hazards Due to Vendor Customization