HOW THE ANALYSIS OF ELECTRICAL CURRENT CONSUMPTION OF EMBEDDED SYSTEMS COULD LEAD TO CODE REVERSING?
LOOKING INTO THE EYE OF THE METER
WINDOWS 8 HEAP INTERNALS
GHOST IS IN THE AIR(TRAFFIC)
A SCIENTIFIC (BUT NON ACADEMIC) STUDY OF HOW MALWARE EMPLOYS ANTI-DEBUGGING, ANTI-DISASSEMBLY AND ANTI-VIRTUALIZATION TECHNOLOGIES
DE MYSTERIIS DOM JOBSIVS: MAC EFI ROOTKITS
DEX EDUCATION: PRACTICING SAFE DEX
HARDWARE BACKDOORING IS PRACTICAL
FLOWERS FOR AUTOMATED MALWARE ANALYSIS