EVASION OF HIGH-END IPS DEVICES IN THE AGE OF IPV6
ATTACKING MOBILE BROADBAND MODEMS LIKE A CRIMINAL WOULD
HOW TO WEAR YOUR PASSWORD
DEFEATING THE TRANSPARENCY FEATURE OF DBI
DATA-ONLY PWNING MICROSOFT WINDOWS KERNEL: EXPLOITATION OF KERNEL POOL OVERFLOWS ON MICROSOFT WINDOWS 8.1
WHY CONTROL SYSTEM CYBER-SECURITY SUCKS...
RESEARCHING ANDROID DEVICE SECURITY WITH THE HELP OF A DROID ARMY
IT JUST (NET)WORKS: THE TRUTH ABOUT IOS 7'S MULTIPEER CONNECTIVITY FRAMEWORK
ABUSE OF CPE DEVICES AND RECOMMENDED FIXES
BITCOIN TRANSACTION MALLEABILITY THEORY IN PRACTICE
ABUSING MICROSOFT KERBEROS: SORRY YOU GUYS DON'T GET IT
SVG: EXPLOITING BROWSERS WITHOUT IMAGE PARSING BUGS
STATIC DETECTION AND AUTOMATIC EXPLOITATION OF INTENT MESSAGE VULNERABILITIES IN ANDROID APPLICATIONS
WHY YOU NEED TO DETECT MORE THAN PTH
CAPSTONE: NEXT GENERATION DISASSEMBLY FRAMEWORK