Hardware and Trust Security: Explain it like I’m 5
Hacking Web Apps
Seeing through the Fog
Alice and Bob are Really Confused
Hacker in the Wires
Forensic Artifacts From a Pass the Hash Attack
Sorry, Wrong Number: Mysteries Of The Phone System - Past and Present
Backdooring Git
Secure Messaging for Normal People
Bugged Files: Is Your Document Telling on You?
Goodbye Memory Scraping Malware: Hold Out Till "Chip And Pin”
Confessions of a Professional Cyber Stalker
Don't Whisper my Chips: Sidechannel and Glitching for Fun and Profit
Cracking Cryptocurrency Brainwallets
Quantum Computers vs. Computers Security
Tell me who you are and I will tell you your lock pattern
Separating Bots from the Humans
Hack the Legacy! IBM i (aka AS/400) Revealed.
Breaking SSL Using Time Synchronisation Attacks
Dissecting the Design of SCADA Web Human Machine Interfaces (HMIs) - Hunting Vulnerabilities
QARK: Android App Exploit and SCA Tool
Chigula — a framework for Wi-Fi Intrusion Detection and Forensics
From 0 To Secure In 1 Minute — Securing IAAS
BurpKit - Using WebKit to Own the Web
Let's Encrypt - Minting Free Certificates to Encrypt the Entire Web
NSA Playset: JTAG Implants
Hacking the Human Body/brain: Identity Shift, the Shape of a New Self, and Humanity 2.0
DIY Nukeproofing: a new dig at "data-mining"
I’m A Newbie Yet I Can Hack ZigBee – Take Unauthorized Control Over ZigBee Devices