PREVALENT CHARACTERISTICS IN MODERN MALWARE
CLOUDBOTS: HARVESTING CRYPTO COINS LIKE A BOTNET FARMER
THE BEAST IS IN YOUR MEMORY: RETURN-ORIENTED PROGRAMMING ATTACKS AGAINST MODERN CONTROL-FLOW INTEGRITY PROTECTION TECHNIQUES
THE BIG CHILL: LEGAL LANDMINES THAT STIFLE SECURITY RESEARCH AND HOW TO DISARM THEM
ABUSING PERFORMANCE OPTIMIZATION WEAKNESSES TO BYPASS ASLR
WRITE ONCE, PWN ANYWHERE
SAVING CYBERSPACE
EXPLOITING UNPATCHED IOS VULNERABILITIES FOR FUN AND PROFIT
THE DEVIL DOES NOT EXIST - THE ROLE OF DECEPTION IN CYBER
LIFECYCLE OF A PHONE FRAUDSTER: EXPOSING FRAUD ACTIVITY FROM RECONNAISSANCE TO TAKEOVER USING GRAPH ANALYSIS AND ACOUSTICAL ANOMALIES
CREATING A SPIDER GOAT: USING TRANSACTIONAL MEMORY SUPPORT FOR SECURITY