Unicorn: Next Generation CPU Emulator Framework
Understanding and Managing Entropy Usage
These are Not Your Grand Daddys CPU Performance Counters - CPU Hardware Performance Counters for Security
Stranger Danger! What is the Risk from 3rd Party Libraries?
Behind the Mask: The Agenda Tricks and Tactics of the Federal Trade Commission as they Regulate Cybersecurity
THIS IS DeepERENT: Tracking App Behaviors with (Nothing Changed) Phone for Evasive Android Malware
Taxonomic Modeling of Security Threats in Software Defined Networking
The Kali Linux Dojo Workshop #1: Rolling Your Own - Generating Custom Kali Linux 20 ISOs
The Kali Linux Dojo Workshop #2: Kali USB Setups with Persistent Stores and LUKS Nuke Support
BGP Stream
Review and Exploit Neglected Attack Surfaces in iOS 8
Breaking Payloads with Runtime Code Stripping and Image Freezing
Dance Like Nobodys Watching Encrypt Like Everyone Is: A Peek Inside the Black Hat Network