Augmenting Static Analysis Using Pintool: Ablation
Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS
Certificate Bypass: Hiding and Executing Malware from a Digitally Signed Executable
Into The Core - In-Depth Exploration of Windows 10 IoT Core
Breaking Kernel Address Space Layout Randomization (KASLR) with Intel TSX
The Risk from Power Lines: How to Sniff the G3 and Prime Data and Detect the Interfere Attack
Keystone Engine: Next Generation Assembler Framework
HTTP Cookie Hijacking in the Wild: Security and Privacy Implications
Cunning with CNG: Soliciting Secrets from Schannel
AirBnBeware: Short Term Rentals Long Term Pwnage
PLC-Blaster: A Worm Living Solely in the PLC
Crumbling the Supercookie and Other Ways the FCC Protects Your Internet Traffic
Building Trust & Enabling Innovation for Voice Enabled IoT