Finding Xori: Malware Analysis Triage with Automated Disassembly
Blockchain Autopsies - Analyzing Ethereum Smart Contract Deaths
Deep Dive into an ICS Firewall Looking for the Fire Hole
Every ROSE has its Thorn: The Dark Art of Remote Online Social Engineering
ZEROing Trust: Do Zero Trust Approaches Deliver Real Security?
Beating the Blockchain by Mapping Out Decentralized Namecoin and Emercoin Infrastructure
Fire & Ice: Making and Breaking macOS Firewalls
The Windows Notification Facility: Peeling the Onion of the Most Undocumented Kernel Attack Surface Yet
Are You Trading Stocks Securely? Exposing Security Flaws in Trading Technologies
Protecting the Protector Hardening Machine Learning Defenses Against Adversarial Attacks
Last Call for SATCOM Security
Practical Web Cache Poisoning: Redefining 'Unexploitable'
Over-the-Air: How we Remotely Compromised the Gateway BCM and Autopilot ECUs of Tesla Cars