NSA Playset: USB Tools
Cockroach Analysis: A Statistical Analysis of the Flash and Java Files that Infest the Internet
Where the Wild Things Are: Encryption, Police Access & the User
Knock Knock: A Survey of iOS Authentication Methods
Understanding a New Memory Corruption Defense: Use-after-Free (UaF) Mitigation and Bypass
Analysis of POS Malware
httpscreenshot - A Tool for Both Teams
There's Waldo! Tracking Users via Mobile Apps
Quantum Computing 01100101
Automated Binary Analysis with Pin and Python
Practical Machine Learning for Network Security
Come to the Dark Side - We Have (Misfortune) Cookies
NaCl: A New Crypto Library
The Joy Of Intelligent Proactive Security
Deception for the Cyber Defender: To Err is Human; to Deceive, Divine
Tap On, Tap Off: Onscreen Keyboards and Mobile Password Entry
Manually Searching Advisories and Blogs for Threat Data--"Who's Got Time for That?"
Rethinking Security's Role in CS Education
0wn the Con
The Windows Sandbox Paradox
Ask the EFF
Golden Flag Awards