DEF Con 32 – AMD Sinkclose Universal Ring-2 Privilege Escalation (Not Redacted) [pdf]

SQL Injection Isn't Dead - Smuggling Queries at the Protocol Level

SpamChannel: Spoofing emails from 2M domains and virtually becoming Satan [pdf]

TETRA Tour de force: Jailbreaking digital radios and base stations for fun and secrets

The hitchhiker’s guide to iPhone Lightning and JTAG hacking [slides]

Privacy Infrastructure: Challenges and Opportunities

DEF CON 25 Music CD

A survey of BSD kernel vulnerabilities (DEF CON)

Backdooring the Lottery

Lightweight Protocol, Critical Implications

A Hacker's Guide to Risk

Defcon 22 Videos and slides