LangSec for Penetration Testing: How and Why
A Widening Attack Plain: Threatcasting Tomorrow’s Threats
So You Want to Hack Radios
Know Normal, Find Evil: Windows 10 Edition
Ask the Feds
Exploring The Infrared World
Who Wants to Allow Arbitrary Code Execution on Their Boxes? We Do It Every Day.
Ask the EFF: Protecting Tomorrow
A Context-Aware Kernel IPC Firewall for Android
Goodnight Moon & the House of Horrors: A look at the current IoT ecosystem and the regulations trying to control it
háček: Computing a Hacker Experience
WaveConverter – An Open Source Software Tool for RF Reverse Engineering
Plug-in Electric Vehicle Fingerprinting: Authentication for Plug-in Electric Vehicles
Flailing is Learning: My First Year as a Malware Analyst
I Have a Graph Database. Now What?
Defeating Sandbox Evasion: How to Increase Successful Emulation Rate in Your Virtualized Environment
The State of Secure Messaging
0wn the Con
Anti-Ransomware: Turning the Tables
The Metadata is the Message (and Sometimes the Message is the Metadata)
User Focused Security at Netflix: Stethoscope