Cockroach Analysis: A Statistical Analysis of the Flash and Java Files that Infest the Internet
Understanding a New Memory Corruption Defense: Use-after-Free (UaF) Mitigation and Bypass
There's Waldo! Tracking Users via Mobile Apps
Practical Machine Learning for Network Security
The Joy Of Intelligent Proactive Security
Manually Searching Advisories and Blogs for Threat Data--"Who's Got Time for That?"
The Windows Sandbox Paradox
No Budget Threat Intelligence: Tracking Malware Campaigns on the Cheap
Infrastructure Tracking with Passive Monitoring and Active Probing
Micronesia: Sub-kernel Kit for Host Introspection in Determining Insider Threat