All Your SMS & Contacts Belong to ADUPS & Others
When IoT Attacks: Understanding the Safety Risks Associated with Connected Devices
Network Automation is Not Your Safe Haven: Protocol Analysis and Vulnerabilities of Autonomic Network
An ACE Up the Sleeve: Designing Active Directory DACL Backdoors
What They're Teaching Kids These Days: Comparing Security Curricula and Accreditations to Industry Needs
Zero Days Thousands of Nights: The Life and Times of Zero-Day Vulnerabilities and Their Exploits
Escalating Insider Threats Using VMware's API
Evading Microsoft ATA for Active Directory Domination
Go to Hunt Then Sleep
Free-Fall: Hacking Tesla from Wireless to CAN Bus
Exploit Kit Cornucopia
And Then the Script-Kiddie Said Let There be No Light. Are Cyber-Attacks on the Power Grid Limited to Nation-State Actors?
Betraying the BIOS: Where the Guardians of the BIOS are Failing