Proliferation
Torturing Open Government Systems for Fun, Profit and Time Travel
Backdoors, Government Hacking and The Next Crypto Wars
ACL Steganography - Permissions to Hide Your Porn
Protecting Data with Short-Lived Encryption Keys and Hardware Root of Trust
Google TV or: How I Learned to Stop Worrying and Exploit Secure Boot
A Password is Not Enough: Why disk encryption is broken and how we might fix it
From Nukes to Cyber – Alternative Approaches for Proactive Defense and Mission Assurance
The Politics of Privacy and Technology: Fighting an Uphill Battle
Defeating Internet Censorship with Dust, the Polymorphic Protocol Engine
Privacy In DSRC Connected Vehicles
Phantom Network Surveillance UAV / Drone
Safety of the Tor network: a look at network diversity, relay operators, and malicious relays
De-Anonymizing Alt.Anonymous.Messages