CYBERSECURITY AS REALPOLITIK
THE BEAST WINS AGAIN: WHY TLS KEEPS FAILING TO PROTECT HTTP
MY GOOGLE GLASS SEES YOUR PASSWORDS!
ANDROID FAKEID VULNERABILITY WALKTHROUGH
GOVERNMENTS AS MALWARE AUTHORS: THE NEXT GENERATION
REFLECTIONS ON TRUSTING TRUSTZONE
LEARN HOW TO CONTROL EVERY ROOM AT A LUXURY HOTEL REMOTELY: THE DANGERS OF INSECURE HOME AUTOMATION DEPLOYMENT
HOW TO LEAK A 100-MILLION-NODE SOCIAL GRAPH IN JUST ONE WEEK? - A REFLECTION ON OAUTH AND API DESIGN IN ONLINE SOCIAL NETWORKS
THE NEW SCOURGE OF RANSOMWARE: A STUDY OF CRYPTOLOCKER AND ITS FRIENDS
EXTREME PRIVILEGE ESCALATION ON WINDOWS 8/UEFI SYSTEMS
SMART NEST THERMOSTAT: A SMART SPY IN YOUR HOME
THE STATE OF INCIDENT RESPONSE
CALL TO ARMS: A TALE OF THE WEAKNESSES OF CURRENT CLIENT-SIDE XSS FILTERING
POACHER TURNED GAMEKEEPER: LESSONS LEARNED FROM EIGHT YEARS OF BREAKING HYPERVISORS