Modern Kernel Pool Exploitation: Attacks and Techniques
Systematic Detection of Capability Leaks in Stock Android Smartphones
Android Attacks
Consumer Password Worst Practices
The Listening: Email Client Backdoor
Stackjacking
Windows Services Hacking
DEFCON 18- These Aren't the Permissions You're Looking For
Enterprise Password Worst Practices
A collection of examples of 64 bit errors in real programs
Scaling Cyberwarfare (Roelker)
Moving Anti-Malware Research Forward (Fraser)
National Cyber Range (Ranka)
Scalable Cyber Deception (Ragsdale)
Secure Computer Systems (Shrobe)
Introducing the Ceylon Project
Strategic Surprise
Exploitation and State Machines
Don't Give Credit: Hacking Arcade Machines
Smooth CoffeeScript