The Growing Irrelevance of US Government Cybersecurity Intelligence Information
The Dirty South – Getting Justified with Technology
Prowling Peer-to-Peer Botnets After Dark
Evil DoS Attacks and Strong Defenses
Kill 'em All — DDoS Protection Total Annihilation!
VoIP Wars: Return of the SIP
Unexpected Stories From a Hacker Who Made it Inside the Government
Dude, WTF in my car?
The Road Less Surreptitiously Traveled
Home Invasion 2.0 - Attacking Network-Controlled Consumer Devices
RFID Hacking: Live Free or RFID Hard
Stalking a City for Fun and Frivolity
Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks
BYO-Disaster and Why Corporate Wireless Security Still Sucks
Noise Floor: Exploring the world of unintentional radio emissions
The Cavalry Isn't Coming: Starting the Revolution to Fsck it All!
The Dark Arts of OSINT
EMET 4.0 PKI Mitigation
Stepping P3wns: Adventures in full spectrum embedded exploitation (and defense!)
EDS: Exploitation Detection System
Conducting massive attacks with open source distributed computing
Revealing Embedded Fingerprints: Deriving intelligence from USB stack interactions