CANCELLED - How to Build the Immune System for the Internet
Dark Side of the DNS Force
A Lightbulb Worm?
BadTunnel: How Do I Get Big Brother Power?
Dungeons Dragons and Security
PINdemonium: A DBI-Based Generic Unpacker for Windows Executable
Samsung Pay: Tokenized Numbers Flaws and Issues
Blunting the Phisher's Spear: A Risk-Based Approach for Defining User Training and Awarding Administrative Privileges
What's the DFIRence for ICS?
Keystone Engine: Next Generation Assembler Framework
The Remote Malicious Butler Did It!
Ouroboros: Tearing Xen Hypervisor with the Snake
TCP Injection Attacks in the Wild - A Large Scale Study
Advanced CAN Injection Techniques for Vehicle Networks
Understanding HL7 2.x Standards Pen Testing and Defending HL7 2.x Messages
The Art of Defense - How Vulnerabilities Help Shape Security Features and Mitigations in Android
Windows 10 Segment Heap Internals
Defense at Hyperscale: Technologies and Policies for a Defensible Cyberspace
HTTP Cookie Hijacking in the Wild: Security and Privacy Implications
Demystifying the Secure Enclave Processor
Next-Generation of Exploit Kit Detection by Building Simulated Obfuscators
Investigating DDOS - Architecture Actors and Attribution
Analysis of the Attack Surface of Windows 10 Virtualization-Based Security
O-checker: Detection of Malicious Documents Through Deviation from File Format Specifications
Hacking Next-Gen ATMs: From Capture to Cashout
Language Properties of Phone Scammers: Cyberdefense at the Level of the Human
The Tao of Hardware the Te of Implants
Cunning with CNG: Soliciting Secrets from Schannel
Hardening AWS Environments and Automating Incident Response for AWS Compromises
badWPAD
When the Cops Come A-Knocking: Handling Technical Assistance Demands from Law Enforcement
Windows 10 Mitigation Improvements
Discovering and Exploiting Novel Security Vulnerabilities in Apple ZeroConf
Weaponizing Data Science for Social Engineering: Automated E2E Spear Phishing on Twitter
Horse Pill: A New Type of Linux Rootkit
SGX Secure Enclaves in Practice: Security and Crypto Review
AirBnBeware: Short Term Rentals Long Term Pwnage
Iran's Soft-War for Internet Dominance
The Year in Flash
Bad for Enterprise: Attacking BYOD Enterprise Mobile Security Solutions
VOIP WARS: The Phreakers Awaken
OSS Security Maturity: Time to Put On Your Big Boy Pants!
Web Application Firewalls: Analysis of Detection Logic
Pangu 9 Internals
Breaking FIDO: Are Exploits in There?
PLC-Blaster: A Worm Living Solely in the PLC
Breaking Hardware-Enforced Security with Hypervisors
The Beast Within - Evading Dynamic Malware Analysis Using Microsoft COM
When Governments Attack: State Sponsored Malware Attacks Against Activists Lawyers and Journalists
Behind The Scenes of iOS Security
The Art of Reverse Engineering Flash Exploits
Using an Expanded Cyber Kill Chain Model to Increase Attack Resiliency
Timing Attacks Have Never Been So Practical: Advanced Cross-Site Search Attacks
DPTrace: Dual Purpose Trace for Exploitability Analysis of Program Crashes
Crumbling the Supercookie and Other Ways the FCC Protects Your Internet Traffic
An AI Approach to Malware Similarity Analysis: Mapping the Malware Genome With a Deep Neural Network
An Inconvenient Trust: User Attitudes Toward Security and Usability Tradeoffs for Key-Directory Encryption Systems
Pay No Attention to That Hacker Behind the Curtain: A Look Inside the Black Hat Network
Attacking SDN Infrastructure: Are We Ready for the Next-Gen Networking?
Over the Edge: Silently Owning Windows 10's Secure Browser
Using Undocumented CPU Behavior to See into Kernel Mode and Break KASLR in the Process
Call Me: Gathering Threat Intelligence on Telephony Scams to Detect Fraud
Dangerous Hare: Hanging Attribute References Hazards Due to Vendor Customization
Building Trust & Enabling Innovation for Voice Enabled IoT