LostPass: Pixel-perfect LastPass Phishing
Users Are People Too: How to Make Your Tools Not Suck for Humans
Exploiting Memory Corruption Vulnerabilities on the FreeRTOS Operating System
Hacking The Wireless World — Software Defined Radio Exploits
Software Security by the Numbers
Online, No One Knows You’re Dead
(P|G)Ohst Exploitation
Using the Algebraic Eraser to Secure Low-Power and Passive IoT Devices
You Ain’t Seen Nothing Yet: New Paradigms for Policy, Regulation, and Community Engagement
The Road to SYSTEM: Recycling Old Vulnerabilities for Unpatched Privilege Escalation and A New Network Attack
Speak Security and Enter: Better Ways to Communicate with Non-Technical Users
Political Pwnage: The Hacker’s Guide to Cybersecurity Policy
0wn the Con
AVLeak: Turning Antivirus Emulators Inside Out
LTE Security and Protocol Exploits
OSX Vulnerability Research and Why We Wrote Our Own Debugger
No Easy Breach: Challenges and Lessons Learned from an Epic Investigation
This Message Will Self-Destruct in 10 Seconds: Avoiding Bilateral Enucleation
Penetration Testing Custom TLS Stacks
Attack on Titans: A Survey of New Attacks Against Big Data and Machine Learning
Ask the EFF