FILE DISINFECTION FRAMEWORK: STRIKING BACK AT POLYMORPHIC VIRUSES
CONFESSIONS OF A WAF DEVELOPER: PROTOCOL-LEVEL EVASION OF WEB APPLICATION FIREWALLS
TORTURING OPENSSL
WEB TRACKING FOR YOU
HERE BE BACKDOORS: A JOURNEY INTO THE SECRETS OF INDUSTRIAL FIRMWARE
STILL PASSING THE HASH 15 YEARS LATER? USING THE KEYS TO THE KINGDOM TO ACCESS ALL YOUR DATA
RECENT JAVA EXPLOITATION TRENDS AND MALWARE
DIGGING DEEP INTO THE FLASH SANDBOXES
SQL INJECTION TO MIPS OVERFLOWS: ROOTING SOHO ROUTERS
HOOKIN' AIN'T EASY: BEEF INJECTION WITH MITM