SECSI PRODUCT DEVELOPMENT: TECHNIQUES FOR ENSURING SECURE SILICON APPLIED TO OPEN-SOURCE VERILOG PROJECTS
WINDOWS KERNEL GRAPHICS DRIVER ATTACK SURFACE
OPENSTACK CLOUD AT YAHOO SCALE: HOW TO AVOID DISASTER
PROTECTING DATA IN-USE FROM FIRMWARE AND PHYSICAL ATTACKS
FINDING AND EXPLOITING ACCESS CONTROL VULNERABILITIES IN GRAPHICAL USER INTERFACES
COMPUTRACE BACKDOOR REVISITED
I KNOW YOUR FILTERING POLICY BETTER THAN YOU DO: EXTERNAL ENUMERATION AND EXPLOITATION OF EMAIL AND WEB SECURITY SOLUTIONS
WHEN THE LIGHTS GO OUT: HACKING CISCO ENERGYWISE
INTERNET SCANNING - CURRENT STATE AND LESSONS LEARNED
FROM ATTACKS TO ACTION - BUILDING A USABLE THREAT MODEL TO DRIVE DEFENSIVE CHOICES
A JOURNEY TO PROTECT POINTS-OF-SALE
PROBABILISTIC SPYING ON ENCRYPTED TUNNELS
BADGER - THE NETWORKED SECURITY STATE ESTIMATION TOOLKIT