Memory Forensics: Current Practices and Future Directions
Five shades of symbolic execution for vulnerability hunting
Recent Wi-Fi attacks and defenses: general lessons learned and open problems
All you want to know about integrated circuit reverse-engineering
Microarchitectural Side-Channel and Fault Attacks
Bluetooth security
Unraveling the Challenges of Modern Fuzzing
Advancements in Research and Engineering
A practical overview of 802.15.4 and ZigBee security
TBC
Mobile network security (TBC)
Legal issues in exploiting vulnerabilities. Examples of intelligence services and the Ex-files project.
Automated kernel exploitation (title TBC)