Running a CTF: Panel and Discussion on the Art of Hacker Gaming
DIY: Using Trust To Secure Embedded Projects
Generalized Single Packet Authorization For Cloud Computing Environments
Malware Analysis: Collaboration, Automation & Training
Armor For Your Android Apps
How Smart Is Bluetooth Smart?
0wn The Con
Identity-Based Internet Protocol Network
Forensics - ExFat Bastardized for Cameras
Mastiff: Automated Static Analysis Framework