Eyes on IZON: Surveilling IP Camera Security
Get Out of Jail Free Cards? What Aviation Can Teach Us About Information Sharing
Crossing the Streams with State Machines in IDS Signature Languages
Another Log to Analyze – Utilizing DNS to Discover Malware in Your Network
Windows Attacks: AT Is the New Black
Weaponizing Your Pets: War Kitteh and the Denial of Service Dog
Womens Tech Collective, and Gender Equality in Tech
Genuinely "Trusted Computing:" Free and Open Hardware Security Modules
Malicious Threats, Vulnerabilities, and Defenses in WhatsApp and Mobile Instant Messaging Platforms
SafeCurves: Choosing Safe Curves for Elliptic-Curve Cryptography
Controlling USB Flash Drive Controllers: Expose of Hidden Features
0wn the Con
AV Evasion With the Veil Framework
ADD -- Complicating Memory Forensics Through Memory Disarray
You Name It, We Analyze It
Having Your Cake and Eating It Too: FOIA, Surveillance, and Privacy
Building An Information Security Awareness Program From Scratch
TrendCoins: Making Money on the Bitcoin/Altcoin Trends
Writing Your Own Disassembler in 15 Minutes
An Open and Affordable USB Man in the Middle Device
unROP: A Tool for In-Memory ROP Exploitation Detection and Traceback
Introducing idb - Simplified Blackbox iOS App Pentesting