Dissecting Non-Malicious Artifacts: One IP at a Time
New Trends in Browser Exploitation: Attacking Client-Side JIT Compilers
There will be Glitches: Extracting and Analyzing Automotive Firmware Efficiently
Mental Health Hacks: Fighting Burnout Depression and Suicide in the Hacker Community
LTE Network Automation Under Threat
A Tangled Curl: Attacks on the Curl-P Hash Function Leading to Signature Forgeries in the IOTA Signature Scheme
Lessons from Virginia - A Comparative Forensic Analysis of WinVote Voting Machines
The Science of Hiring and Retaining Female Cybersecurity Engineers
Decompiler Internals: Microcode
WebAssembly: A New World of Native Exploits on the Browser
From Thousands of Hours to a Couple of Minutes: Automating Exploit Generation for Arbitrary Types of Kernel Vulnerabilities
SDL That Won't Break the Bank
Follow the White Rabbit: Simplifying Fuzz Testing Using FuzzExMachina