Constricting the Web: Offensive Python for Web Hackers
New Threats to Privacy: From TIA to Google
Keeping the Good Stuff In: Confidential Information Firewalling with the CRM114 Spam Filter & Text Classifier
Memory Corruption Attacks: The (almost) Complete History...
CLOUDINOMICON: Idempotent Infrastructure, Survivable Systems & Bringing Sexy Back to Info Centricity
CSI: TCP/IP
Microsoft Powershell - It's time to own
Breaking Browsers: Hacking Auto-Complete
How to Hack Millions of Routers
State of SSL on the Internet: 2010 Survey, Results and Conclusions Routers
pyREtic – Reversing obfuscated Python bytecode & live Python objects
Regional Collegiate Cyberdefense Competition
Utilizing Code Reuse/Return Oriented Programming in PHP Web Application Exploits
Unauthorized Internet Wiretapping: Exploiting Lawful Intercept
Hacking Oracle From Web Apps
There's a party at Ring0 (and you're invited)
Secure Use of Cloud Storage
Policy, Privacy, Deterrence and Cyber War
Elevation of Privilege: The Easy way to Threat Model
You Will be Billed $90,000 for This Call
HTTPS Can Byte Me
Becoming the six-million-dollar man
Voyage of the Reverser: A Visual Study of Binary Species
Your Career = Your Business
GWT Security: Don’t Get Distracted by Bright Shiny Objects
The DMCA & ACTA vs. Academic & Professional Research: How Misuse of this Intellectual Property Legislation Chills Research, Disclosure and Innovation
Token Kidnapping's Revenge
Return-Oriented Exploitation
Virtually Pwned: Pentesting Virtualization
Human Intel
ISC SIE Passive DNS vs. Apache Cassandra
Reverse Engineering with Hardware Debuggers
Blitzableiter - the Release
Defenseless in Depth
TitanMist: Your First Step to Reversing Nirvana
Things You Wanted To Know But Were Afraid To Ask About Managing Your Information Security Career
How I Met Your Girlfriend
Attacking Phone Privacy
Hacking and protecting Oracle Database Vault
Understanding the Low- Fragmentation Heap: From Allocation to Exploitation
Virt-ICE: Next Generation Debugger for Malware Analysis
Ex-Fed Confessions
SpewPAL: How capturing and replaying attack traffic can save your IDS
Hadoop Security Design? Just Add Kerberos? Really?
The Black Art of Binary Hijacking
Hacking Browser's DOM - Exploiting Ajax and RIA
Need a hug? I'm secure.
NEPTUNE: Dissecting Web-based Malware via Browser and OS Instrumentation
ISSA
Deconstructing ColdFusion
Carmen Sandiego is On the Run!
Cryptographic Agility: Defending Against the Sneakers Scenario
Advanced AIX Heap Exploitation Methods
dirtbox: a Highly Scalable x86/Windows Emulator
Meet the Feds Reception
Lifting the Fog
USB - HID, The Hacking Interface Design
Security is Not a Four Letter Word
Bad Memories
Lord of the Bing: Taking back search engine hacking from Google and Bing
Goodware drugs for malware: on-the-fly malware analysis and containment