An Open and Affordable USB Man in the Middle Device
"How I Met Your Mother" or The Brief and Secret History of Bletchley Park and How They Invented Cryptography and the Computer Age
Malicious Online Activities Related to the 2012 U.S. General Election
unROP: A Tool for In-Memory ROP Exploitation Detection and Traceback
Raising Costs for Your Attackers Instead of Your CFO
Vehicle Forensics - The Data Beyond the Dashboard
Introducing idb - Simplified Blackbox iOS App Pentesting
Practical Applications of Data Science in Detection
You Don't Have the Evidence
Large Scale Network and Application Scanning
Closing Remarks