Все публикации

GT - Navigating the Changing Cyber Landscape: Trends, Costs, and Risk Mitigation Strategies

GT - Seek out new protocols, and boldly go where no one has gone before

IATC - Hungry, Hungry Hackers

GT - ZERO-RULES Alert Contextualizer & Correlator

HG - Tracking and hacking your career

HG - What Goes Bump in the Night? Recruiter Panel About Job Search and Other Scary Things

HG - You Need a Jay-z and a Beyoncé

GF - Pipeline Pandemonium: How to Hijack the Cloud and Make it Rain Insecurity

CG - 101 Things Your Application is Doing Without Your Knowledge

PW - Detecting Credential Abuse

PG - An adversarial approach to Airline Revenue Management

GT - What Do We Learn When We Scan the Internet every hour?

HG - Behavioral Interviewee-ing: Inverting the Corporate Interview to Get You Hired

PG - Unleashing the Future of Development: The Secret World of Nix & Flakes

IATC - Health Care is in Intensive Care

PG - And what if it was hacked? Tactics and Impacts of Adversarial Machine Learning

IATC - Blood in the Water: Preparing For the Feeding Frenzy

GT - Incubated Machine Learning Exploits: Backdooring ML Pipelines Using Input-Handling Bugs

HG - Brute Force Your Job Application

BG - JIT Happens: How Instacart Uses AI to Keep Doors Open and Risks Closed

PG - Taking D-Bus to Explore the Bluetooth Landscape

BG - Chrome Cookie Theft on macOS, and How To Prevent It

PW - Picking a fight with the banks

BG - Fuzzing Frontiers: Exploring Unknown Unknown Vulnerabilities