CELLULAR EXPLOITATION ON A GLOBAL SCALE: THE RISE AND FALL OF THE CONTROL PROTOCOL
A SURVEY OF REMOTE AUTOMOTIVE ATTACK SURFACES
ORACLE DATA REDACTION IS BROKEN
PULLING BACK THE CURTAIN ON AIRPORT SECURITY: CAN A WEAPON GET PAST TSA?
BREAKING THE SECURITY OF PHYSICAL DEVICES
BADUSB - ON ACCESSORIES THAT TURN EVIL
BUILDING SAFE SYSTEMS AT SCALE - LESSONS FROM SIX MONTHS AT YAHOO
MISSION MPOSSIBLE
48 DIRTY LITTLE SECRETS CRYPTOGRAPHERS DON'T WANT YOU TO KNOW
SATCOM TERMINALS: HACKING BY AIR, SEA, AND LAND
HACKING THE WIRELESS WORLD WITH SOFTWARE DEFINED RADIO - 2.0