Exposing the Bait: A Qualitative Look at the Impact of Autonomous Peer Communication to Enhance Organizational Phishing Detection
From Bot to Robot: How Abilities and Law Change with Physicality
Reversing a Japanese Wireless SD Card - From Zero to Code Execution
Subverting Sysmon: Application of a Formalized Security Product Evasion Methodology
Breaking Parser Logic: Take Your Path Normalization off and Pop 0days Out!
Back to the Future: A Radical Insecure Design of KVM on ARM
Real Eyes Realize Real Lies: Beating Deception Technologies
Snooping on Cellular Gateways and Their Critical Role in ICS
Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels
Wrangling with the Ghost: An Inside Story of Mitigating Speculative Execution Side Channel Vulnerabilities
Legal Liability for IOT Cybersecurity Vulnerabilities
Lowering the Bar: Deep Learning for Side Channel Analysis
It's a PHP Unserialization Vulnerability Jim but Not as We Know It