Securing our Nation's Election Infrastructure
Please do not Duplicate: Attacking the Knox Box and Other Keyed Alike Systems
Lora Smart Water Meter Security Analysis
Who Controls the Controllers—Hacking Crestron IoT Automation Systems
One-Click to OWA
Fasten your seatbelts: We are escaping iOS 11 sandbox!
Revolting Radios
Privacy infrastructure, challenges and opportunities
Your Voice is My Passport
Reverse Engineering, hacking documentary series
You may have paid more than you imagine—Replay Attacks on Ethereum Smart Contracts
Jailbreaking the 3DS through 7 years of hardening
Ridealong Adventures—Critical Issues with Police Body Cameras
Looking for the perfect signature: an automatic YARA rules generation algorithm in the AI-era
Infecting The Embedded Supply Chain
Playing Malware Injection with Exploit thoughts
Fire & Ice: Making and Breaking macOS Firewalls
Booby Trapping Boxes
Inside the Fake Science Factory
For the Love of Money: Finding and exploiting vulnerabilities in mobile point of sales systems
Demystifying MS17-010: Reverse Engineering the ETERNAL Exploits
Designing and Applying Extensible RF Fuzzing Tools to Expose PHY Layer Vulnerabilities
barcOwned—Popping shells with your cereal box
Edge Side Include Injection: Abusing Caching Servers into SSRF and Transparent Session Hijacking
One bite and all your dreams will come true: Analyzing and Attacking Apple Kernel Drivers
Fuzzing Malware For Fun & Profit. Applying Coverage-guided Fuzzing to Find and Exploit Bugs in Modern Malware