They're Coming for Your Tools: Exploiting Design Flaws for Active Intrusion Prevention
The Avalanche Takedown: Landslide for Law Enforcement
How We Created the First SHA-1 Collision and What it Means for Hash Security
What's on the Wireless? Automating RF Signal Identification
Evilsploit – A Universal Hardware Hacking Toolkit
Garbage In Garbage Out: How Purportedly Great Machine Learning Models can be Screwed Up by Bad Data
The Epocholypse 2038: What's in Store for the Next 20 Years
Datacenter Orchestration Security and Insecurity: Assessing Kubernetes Mesos and Docker at Scale
Don't Trust the DOM: Bypassing XSS Mitigations via Script Gadgets
Attacking Encrypted USB Keys the Hard(ware) Way
Defeating Samsung KNOX with Zero Privilege
Digital Vengeance: Exploiting the Most Notorious C&C Toolkits
The Adventures of AV and the Leaky Sandbox