A STITCH IN TIME SAVES NINE: A CASE OF MULTIPLE OPERATING SYSTEM VULNERABILITY
THE DEFENSE RESTS: AUTOMATION AND APIS FOR IMPROVING SECURITY
CONTROL-ALT-HACK(TM): WHITE HAT HACKING FOR FUN AND PROFIT (A COMPUTER SECURITY CARD GAME)
INTRUSION DETECTION ALONG THE KILL CHAIN: WHY YOUR DETECTION SYSTEM SUCKS AND WHAT TO DO ABOUT IT
EXPLOIT MITIGATION IMPROVEMENTS IN WIN 8
THE SUBWAY LINE 8 - EXPLOITATION OF WINDOWS 8 METRO STYLE APPS
WE HAVE YOU BY THE GADGETS
EXCHANGING DEMANDS
WINDOWS PHONE 7 INTERNALS AND EXPLOITABILITY
EASY LOCAL WINDOWS KERNEL EXPLOITATION