Adventures in Attacking Wind Farm Control Networks
Industroyer/Crashoverride: Zero Things Cool About a Threat Group Targeting the Power Grid
Taking Windows 10 Kernel Exploitation to the Next Level – Leveraging Write-What-Where Vulnerabilities in Creators Update
Automated Testing of Crypto Software Using Differential Fuzzing
Fighting the Previous War (aka: Attacking and Defending in the Era of the Cloud)
Intercepting iCloud Keychain
Pwnie Awards
Skype & Type: Keystroke Leakage over VoIP
Advanced Pre-Breach Planning: Utilizing a Purple Team to Measure Effectiveness vs. Maturity
Hunting GPS Jammers
Game of Chromes: Owning the Web with Zombie Chrome Extensions
Evolutionary Kernel Fuzzing
WiFuzz: Detecting and Exploiting Logical Flaws in the Wi-Fi Cryptographic Handshake
IoTCandyJar: Towards an Intelligent-Interaction Honeypot for IoT Devices