PEIMA: Harnessing Power Laws to Detect Malicious Activities from Denial of Service to Intrusion Detection Traffic Analysis and Beyond
Taking DMA Attacks to the Next Level: How to do Arbitrary Memory Reads/Writes in a Live and Unmodified System Using a Rogue Memory Controller
Delivering Javascript to World+Dog
So You Want to Market Your Security Product...
WSUSpendu: How to Hang WSUS Clients
(in)Security in Building Automation: How to Create Dark Buildings with Light Speed
OpenCrypto: Unchaining the JavaCard Ecosystem
rVMI: A New Paradigm for Full System Analysis
Intel SGX Remote Attestation is Not Sufficient
kR\^X: Comprehensive Kernel Protection Against Just-In-Time Code Reuse
Evil Bubbles or How to Deliver Attack Payload via the Physics of the Process
Blue Pill for Your Phone
RBN Reloaded - Amplifying Signals from the Underground