A Wireless Journeyman’s Experience in Practical SIGINT
Adversary Detection Pipelines: Finally Making Your Threat Intel Useful
Crossing the Border With Your Electronic Devices
Knowing the UnFuzzed and Finding Bugs with Coverage Analysis
Real World Zero Trust Implementation
Playing the Short Game: The Effects of Data Breaches on Share Prices
The Verilog to Verilog Decompiler
Project Everest: Fast, Correct, and Secure Software for Deployment Now!
Hack the Stars
Between Two Moose
Closing Remarks