The Background Noise of the Internet
Profiling and Detecting all Things SSL with JA3
Nation-State Espionage: Hunting Multi-Platform APTs on a Global Scale
Catch Me If You Can: A Decade of Evasive Malware Attack and Defense
Someone is Lying to You on the Internet: Using Analytics to Find Bot Submissions in the FCC Net Neutrality Submissions
Bludgeoning Bootloader Bugs: No Write Left Behind
AWS Honey Tokens with SPACECRAB
Time Signature Based Matching for Data Fusion and Coordination Detection in Cyber Relevant Logs
Defending Against Robot Attacks
Deep Learning for Realtime Malware Detection
Securing Bare Metal Hardware at Scale
Getting Cozy with OpenBSM Auditing on MacOS … The Good, the Bad, & the Ugly