Internet Plumbing for Security Professionals: The State of BGP Security
Attacking Interoperability - An OLE Edition
Adventures in Femtoland: 350 Yuan for Invaluable Fun
Stagefright: Scary Code in the Heart of Android
Optimized Fuzzing IOKit in iOS
Graphic Content Ahead: Towards Automated Scalable Analysis of Graphical Images Embedded in Malware
Remote Physical Damage 101 - Bread and Butter Attacks
Repurposing OnionDuke: A Single Case Study Around Reusing Nation State Malware
Panel: How the Wassenaar Arrangements Export Control of Intrusion Software Affects the Security Industry
Information Access and Information Sharing: Where We are and Where We are Going
Is the NSA Still Listening to Your Phone Calls? A Surveillance Debate: Congressional Success or Epic Fail
Rocking the Pocket Book: Hacking Chemical Plant for Competition and Extortion
Harnessing Intelligence from Malware Repositories