Exploitation Trends: From Potential Risk to Actual Risk
Incoming Threats At the Speed of Retail
Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and Sharing
Malware Activity in Mobile Networks – An Insider View
Complete Application Ownage via Multi-POST XSRF
Confessions of a Professional Cyber Stalker
Breaking Access Controls with BLEKey
UNMASKING MALWARE
Automation is your Friend: Embracing SkyNet to Scale Cloud Security
Making & Breaking Machine Learning Anomaly Detectors in Real Life
Drug Pump and Medical Device Security
Stealth Attack From The Produce Aisle
DevOps For The Home
Hijacking Arbitrary .NET Application Control Flow
Stealthier Attacks and Smarter Defending with TLS Fingerprinting
Breaking and Fixing Python Applications
Software Defined Networking / Attacker Defined Networking
What Google knows about you and your devices, and how to get it
Xenophobia is Hard on Data: Forced Localization, Data Storage, and Business Realities
Cymon - An Open Threat Intelligence System
Learning To Love Your Attackers