Wire Me Through Machine Learning
Real Humans Simulated Attacks: Usability Testing with Attack Scenarios
SS7 Attacker Heaven Turns into Riot: How to Make Nation-State and Intelligence Attackers' Lives Much Harder on Mobile Networks
Fractured Backbone: Breaking Modern OS Defenses with Firmware Attacks
Developing Trust and Gitting Betrayed
Offensive Malware Analysis: Dissecting OSX/FruitFly via a Custom C&C Server
The Industrial Revolution of Lateral Movement
Fad or Future? Getting Past the Bug Bounty Hype
Practical Tips for Defending Web Applications in the Age of DevOps
Honey I Shrunk the Attack Surface – Adventures in Android Security Hardening
Firmware is the New Black - Analyzing Past Three Years of BIOS/UEFI Security Vulnerabilities
Well that Escalated Quickly! How Abusing Docker API Led to Remote Code Execution Same Origin Bypass and Persistence in the Hypervisor via Shadow Containers
Cloak & Dagger: From Two Permissions to Complete Control of the UI Feedback Loop