Through the Eyes of the Attacker: Designing Embedded Systems Exploits for Industrial Control Systems
It WISN't me, attacking industrial wireless mesh networks
You're just complaining because you're guilty: A DEF CON Guide to Adversarial Testing of Software Used In the Criminal Justice System
You may have paid more than you imagine—Replay Attacks on Ethereum Smart Contracts
Hacking PLCs and Causing Havoc on Critical Infrastructures
Exploiting Active Directory Administrator Insecurities
Compression Oracle Attacks on VPN Networks
Jailbreaking the 3DS through 7 years of hardening
Building Absurd Christmas Light Shows
Tineola: Taking a Bite Out of Enterprise Blockchain
You'd better secure your BLE devices or we'll kick your butts !
Ridealong Adventures—Critical Issues with Police Body Cameras
One Step Ahead of Cheaters -- Instrumenting Android Emulators
In Soviet Russia Smartcard Hacks You
Reaping and breaking keys at scale: when crypto meets big data
Looking for the perfect signature: an automatic YARA rules generation algorithm in the AI-era
House of Roman—a "leakless" heap fengshui to achieve RCE on PIE Binaries
The ring 0 façade: awakening the processor's inner demons
Detecting Blue Team Research Through Targeted Ads
Infecting The Embedded Supply Chain
Having fun with IoT: Reverse Engineering and Hacking of Xiaomi IoT Devices
SMBetray—Backdooring and breaking signatures
Digital Leviathan: a comprehensive list of Nation-State Big Brothers (from huge to little ones
Playing Malware Injection with Exploit thoughts
Sex Work After SESTA/FOSTA
Fire & Ice: Making and Breaking macOS Firewalls
Project Interceptor: avoiding counter-drone systems with nanodrones
All your math are belong to us
Reverse Engineering Windows Defender's Emulator
Booby Trapping Boxes
Outsmarting the Smart City
80 to 0 in under 5 seconds: Falsifying a medical patient's vitals
All your family secrets belong to us—Worrisome security issues in tracker apps
Inside the Fake Science Factory
The Road to Resilience: How Real Hacking Redeems this Damnable Profession
Relocation Bonus: Attacking the Windows Loader Makes Analysts Switch Careers
Privacy Is Equality—And It's Far from Dead
Beyond the Lulz: Black-Hat Trolling, White-Hat Trolling, Attacking and Defending Our Attention Landscape
EFF Fireside Hax (AKA Ask the EFF)