SEXYDEFENSE - MAXIMIZING THE HOME-FIELD ADVANTAGE
EXPLOITING THE JEMALLOC MEMORY ALLOCATOR: OWNING FIREFOX'S HEAP
THE INFO LEAK ERA ON SOFTWARE EXPLOITATION
ARE YOU MY TYPE? - BREAKING .NET SANDBOXES THROUGH SERIALIZATION
PINPADPWN
IOS SECURITY
IOS KERNEL HEAP ARMAGEDDON REVISITED
WHEN SECURITY GETS IN THE WAY: PENTESTING MOBILE APPS THAT USE CERTIFICATE PINNING
EMBEDDED DEVICE FIRMWARE VULNERABILITY HUNTING USING FRAK
MAPPING AND EVOLUTION OF ANDROID PERMISSIONS
IOS APPLICATION SECURITY ASSESSMENT AND AUTOMATION: INTRODUCING SIRA
HOW MANY BRICKS DOES IT TAKE TO CRACK A MICROCELL?