Genuinely "Trusted Computing:" Free and Open Hardware Security Modules
Malicious Threats, Vulnerabilities, and Defenses in WhatsApp and Mobile Instant Messaging Platforms
SafeCurves: Choosing Safe Curves for Elliptic-Curve Cryptography
Controlling USB Flash Drive Controllers: Expose of Hidden Features
0wn the Con
AV Evasion With the Veil Framework
ADD -- Complicating Memory Forensics Through Memory Disarray
An Open and Affordable USB Man in the Middle Device
unROP: A Tool for In-Memory ROP Exploitation Detection and Traceback
Introducing idb - Simplified Blackbox iOS App Pentesting