Software Attacks on Hardware Wallets
Deep Neural Networks for Hackers: Methods Applications and Open Source Tools
Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers
From Workstation to Domain Admin: Why Secure Administration isn't Secure and How to Fix it
Breaking the IIoT: Hacking industrial Control Gateways
Is the Mafia Taking Over Cybercrime?
Demystifying PTSD in the Cybersecurity Environment
Kernel Mode Threats and Practical Defenses
AI & ML in Cyber Security - Why Algorithms are Dangerous
Applied Self-Driving Car Security
Exploitation of a Modern Smartphone Baseband
Understanding and Exploiting Implanted Medical Devices
DeepLocker - Concealing Targeted Attacks with AI Locksmithing