Constant Insecurity: Things you didn't know about (PE) Portable Executable file format
Physical Memory Forensics for Cache
Beyond files undeleting: OWADE
Covert Post-Exploitation Forensics With Metasploit
Post Memory Corruption Memory Analysis
Hacking Androids for Profit
Exploiting the iOS Kernel
Owning Your Phone at Every Layer - A Mobile Security Panel
Pentesting the Smart Grid
Don't Hate the Player, Hate the Game: Inside the Android Security Patch Lifecycle
Mobile Malware Madness, and How To Cap the Mad Hatters