Bring Back the Honeypots
Take a Hacker to Work Day - How Federal Prosecutors Use the CFAA
SMBv2: Sharing More than Just Your Files
Back Doors and Front Doors Breaking the Unbreakable System
Crash & Pay: How to Own and Clone Contactless Payment Devices
How Vulnerable are We to Scams?
ROPInjector: Using Return Oriented Programming for Polymorphism and Antivirus Evasion
Bringing a Cannon to a Knife Fight
How to Implement IT Security After a Cyber Meltdown
ZigBee Exploited the Good the Bad and the Ugly
Broadcasting Your Attack: Security Testing DAB Radio in Cars
Deep Learning on Disassembly
Exploiting Out-of-Order Execution for Covert Cross-VM Communication