Why Security Data Science Matters and How Its Different: Pitfalls and Promises of Data Science Based Breach Detection and Threat Intelligence
Abusing Silent Mitigations - Understanding Weaknesses Within Internet Explorers Isolated Heap and MemoryProtection
Switches Get Stitches
Securing Your Big Data Environment
Attacking ECMAScript Engines with Redefinition
My Bro the ELK: Obtaining Context from Security Events
Certifi-gate: Front-Door Access to Pwning Millions of Androids
Return to Where? You Cant Exploit What You Cant Find
Bypass Control Flow Guard Comprehensively
Assessing and Exploiting BigNum Vulnerabilities
HI THIS IS URGENT PLZ FIX ASAP: Critical Vulnerabilities and Bug Bounty Programs
Hidden Risks of Biometric Identifiers and How to Avoid Them