Detecting Credential Compromise in AWS
A Dive in to Hyper-V Architecture & Vulnerabilities
Remotely Attacking System Firmware
Meltdown: Basics Details Consequences
Behind the Speculative Curtain: The True Story of Fighting Meltdown and Spectre
The Air-Gap Jumpers
Two-Factor Authentication Usable or Not? A Two-Phase Usability Study of the FIDO U2F Security Key
Identity Theft: Attacks on SSO Systems
GOD MODE UNLOCKED - Hardware Backdoors in x86 CPUs
So I became a Domain Controller
Catch me Yes we can! – Pwning Social Engineers using Natural Language Processing Techniques in Real-Time
IoT Malware: Comprehensive Survey Analysis Framework and Case Studies
An Attacker Looks at Docker: Approaching Multi-Container Applications