Genuinely "Trusted Computing:" Free and Open Hardware Security Modules
Introducing DARPA's Cyber Grand Challenge
Technology Law Issues for Security Professionals
Introduction To Reverse Engineering Software (repeat)
Introduction To Software Exploits
Malicious Threats, Vulnerabilities, and Defenses in WhatsApp and Mobile Instant Messaging Platforms
Unambiguous Encapsulation - Separating Data and Signaling
I Found a Thing and You Can (Should) Too: ISP's Unauthenticated SOAP Service = Find (Almost) All The Things!
Intermediate Intel x86: Architecture, Assembly, Applications, & Alliteration
Exploits 2: Exploitation in the Windows Environment
SafeCurves: Choosing Safe Curves for Elliptic-Curve Cryptography
A Critical Review of Spatial Analysis
Arms Race: The Story of (In)-Secure Bootloaders
The Life of Binaries
Android Forensics & Security Testing (repeat)
Controlling USB Flash Drive Controllers: Expose of Hidden Features
Data Whales and Troll Tears: Beat the Odds in InfoSec
Syncing Mentorship Between Winners And Beginners
Rootkits: What they are, and how to find them
Introduction to ARM
0wn the Con
Operationalizing Threat Information Sharing: Beyond Policies and Platitudes
The NSA: Capabilities and Countermeasures
Malware Dynamic Analysis
Flow Analysis & Network Hunting
AV Evasion With the Veil Framework
The "Science of Cyber" and the Next Generation of Security Tools
How to Train your Snapdragon: Exploring Power Frameworks on Android
Introductory Intel x86: Architecture, Assembly, Applications, & Alliteration (repeat)
Pcap Analysis & Network Hunting
ADD -- Complicating Memory Forensics Through Memory Disarray
Timing-Based Attestation: Sexy Defense, or the Sexiest?
LTE vs. Darwin
Reverse Engineering Malware
Offensive, Defensive, and Forensic Techniques for Determining Web User Identity
Introduction To Vulnerability Assessment
Lessons-Learned in Designing a Training Course for Professionals
You Name It, We Analyze It
Having Your Cake and Eating It Too: FOIA, Surveillance, and Privacy
Building An Information Security Awareness Program From Scratch
TrendCoins: Making Money on the Bitcoin/Altcoin Trends
Writing Your Own Disassembler in 15 Minutes