ADVANCED ARM EXPLOITATION
SCALING UP BASEBAND ATTACKS: MORE (UNEXPECTED) ATTACK SURFACE
DON'T STAND SO CLOSE TO ME: AN ANALYSIS OF THE NFC ATTACK SURFACE
PROBING MOBILE OPERATOR NETWORKS
ADVENTURES IN BOUNCERLAND
CATCHING INSIDER DATA THEFT WITH STOCHASTIC FORENSICS
FIND ME IN YOUR DATABASE: AN EXAMINATION OF INDEX SECURITY
PASSIVE BLUETOOTH MONITORING IN SCAPY
SYNFUL DECEIT, STATEFUL SUBTERFUGE
STAMP OUT HASH CORRUPTION, CRACK ALL THE THINGS
CLONEWISE - AUTOMATED PACKAGE CLONE DETECTION
SSRF VS. BUSINESS CRITICAL APPLICATIONS