How to Hack Government: Technologists as Policy Makers
Breaking HTTPS with BGP Hijacking
Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and Sharing
WSUSpect - Compromising the Windows Enterprise via Windows Update
Faux Disk Encryption: Realities of Secure Storage on Mobile Devices
Subverting Satellite Receivers for Botnet and Profit
CrackLord: Maximizing Password Cracking Boxes
Web Timing Attacks Made Practical
Breaking Access Controls with BLEKey
Forging the USB Armory an Open Source Secure Flash-Drive-Sized Computer
When IoT Attacks: Hacking a Linux-Powered Rifle
Abusing XSLT for Practical Attacks
Fuzzing Android System Services by Binder Call to Escalate Privilege