AN INTERVIEW WITH NEAL STEPHENSON
TRUST, SECURITY, AND SOCIETY
HTML5 TOP 10 THREATS – STEALTH ATTACKS AND SILENT EXPLOITS
A SCIENTIFIC (BUT NON ACADEMIC) STUDY OF HOW MALWARE EMPLOYS ANTI-DEBUGGING, ANTI-DISASSEMBLY AND ANTI-VIRTUALIZATION TECHNOLOGIES
CATCHING INSIDER DATA THEFT WITH STOCHASTIC FORENSICS
THE SUBWAY LINE 8 - EXPLOITATION OF WINDOWS 8 METRO STYLE APPS
IOS SECURITY
STILL PASSING THE HASH 15 YEARS LATER? USING THE KEYS TO THE KINGDOM TO ACCESS ALL YOUR DATA
LESSONS OF BINARY ANALYSIS
THE DARK ART OF IOS APPLICATION HACKING
THE CHRISTOPHER COLUMBUS RULE AND DHS
AMF TESTING MADE EASY!
DE MYSTERIIS DOM JOBSIVS: MAC EFI ROOTKITS
FIND ME IN YOUR DATABASE: AN EXAMINATION OF INDEX SECURITY
WE HAVE YOU BY THE GADGETS
IOS KERNEL HEAP ARMAGEDDON REVISITED
RECENT JAVA EXPLOITATION TRENDS AND MALWARE
LEGAL ASPECTS OF CYBERSPACE OPERATIONS
HACKING WITH WEBSOCKETS
DEX EDUCATION: PRACTICING SAFE DEX
PASSIVE BLUETOOTH MONITORING IN SCAPY
EXCHANGING DEMANDS
WHEN SECURITY GETS IN THE WAY: PENTESTING MOBILE APPS THAT USE CERTIFICATE PINNING
DIGGING DEEP INTO THE FLASH SANDBOXES
SNSCAT: WHAT YOU DON'T KNOW ABOUT SOMETIMES HURTS THE MOST
RUBY FOR PENTESTERS: THE WORKSHOP
SYNFUL DECEIT, STATEFUL SUBTERFUGE
EMBEDDED DEVICE FIRMWARE VULNERABILITY HUNTING USING FRAK
STAMP OUT HASH CORRUPTION, CRACK ALL THE THINGS
MAPPING AND EVOLUTION OF ANDROID PERMISSIONS
TARGETED INTRUSION REMEDIATION: LESSONS FROM THE FRONT LINES
BLENDED THREATS AND JAVASCRIPT: A PLAN FOR PERMANENT NETWORK COMPROMISE
HARDWARE BACKDOORING IS PRACTICAL
CLONEWISE - AUTOMATED PACKAGE CLONE DETECTION
WINDOWS PHONE 7 INTERNALS AND EXPLOITABILITY
IOS APPLICATION SECURITY ASSESSMENT AND AUTOMATION: INTRODUCING SIRA
SQL INJECTION TO MIPS OVERFLOWS: ROOTING SOHO ROUTERS
MOBILE NETWORK FORENSICS WORKSHOP
HACKING THE CORPORATE MIND: USING SOCIAL ENGINEERING TACTICS TO IMPROVE ORGANIZATIONAL SECURITY ACCEPTANCE
STATE OF WEB EXPLOIT TOOLKITS
FLOWERS FOR AUTOMATED MALWARE ANALYSIS
SSRF VS. BUSINESS CRITICAL APPLICATIONS
EASY LOCAL WINDOWS KERNEL EXPLOITATION
HOW MANY BRICKS DOES IT TAKE TO CRACK A MICROCELL?
HOOKIN' AIN'T EASY: BEEF INJECTION WITH MITM