1. The Impact of BGP Misconfiguration on Connectivity

    The Impact of BGP Misconfiguration on Connectivity

    3
  2. A Systematic Approach to BGP Configuration Checking

    A Systematic Approach to BGP Configuration Checking

    3
  3. R BGP Ensuring Connectivity During BGP Convergence

    R BGP Ensuring Connectivity During BGP Convergence

    2
  4. Anatomy of a Leak AS9121 or, How We Learned To Start Worrying and Hate Maximum Prefix Limits

    Anatomy of a Leak AS9121 or, How We Learned To Start Worrying and Hate Maximum Prefix Limits

    6
  5. How To Use Bug Bounty To Start A Career In Silicon Valley Adam Ruddermann

    How To Use Bug Bounty To Start A Career In Silicon Valley Adam Ruddermann

    4
  6. Another Flip in the Wall of Rowhammer Defenses

    Another Flip in the Wall of Rowhammer Defenses

    1
  7. Dragonblood Analyzing the Dragonfly Handshake of WPA3 and EAP pwd

    Dragonblood Analyzing the Dragonfly Handshake of WPA3 and EAP pwd

    14
  8. Can Voters Detect Malicious Manipulation of Ballot Marking Devices

    Can Voters Detect Malicious Manipulation of Ballot Marking Devices

    2
  9. MalloDroid, Hunting Down Broken SSL in Android Apps

    MalloDroid, Hunting Down Broken SSL in Android Apps

    1
  10. No one left behind Security Defense through Gamification including CTFs Kashish Mittal

    No one left behind Security Defense through Gamification including CTFs Kashish Mittal

    1
  11. Hacking the pandemic's most popular software Zoom

    Hacking the pandemic's most popular software Zoom

    4
  12. Keynote The Security Development Lifecycle 3 4

    Keynote The Security Development Lifecycle 3 4

    11
  13. John Norman Physical Security Bridging the Gap With Open Source Hardware

    John Norman Physical Security Bridging the Gap With Open Source Hardware

    1
  14. Bug Bounty Hunting Methodology v2 Jason Haddix from Bugcrowd's LevelUp 2017

    Bug Bounty Hunting Methodology v2 Jason Haddix from Bugcrowd's LevelUp 2017

    13
  15. Automated Reverse Engineering and Privacy Analysis of Modern Cars

    Automated Reverse Engineering and Privacy Analysis of Modern Cars

    2