LostPass: Pixel-perfect LastPass Phishing
Hacking The Wireless World — Software Defined Radio Exploits
(P|G)Ohst Exploitation
The Road to SYSTEM: Recycling Old Vulnerabilities for Unpatched Privilege Escalation and A New Network Attack
0wn the Con
OSX Vulnerability Research and Why We Wrote Our Own Debugger
Penetration Testing Custom TLS Stacks
Compressed Context Based Analytic Results for Use in Computer Vision System for Network Defense
Be Free, Little GuardBunny!
Reverse-Engineering Wireless SCADA Systems