• Hopeless Relay Protection for Substation Automation

    – by Kirill Nesterov, Alexander Tlyapov

  • Transforming Open Source to Open Access in Closed Applications

    – by Brian Gorenc, Jasiel Spelman, Abdul-Aziz Hariri

  • r2m2

    – by Guillaume VALADON / guedou

  • Hackable Security Modules Reversing and exploiting a FIPS 140-2 lvl 3 HSM firmware

    – by Fotis Loukos

  • GRAP: define and match graph patterns within binaries

    – by Aurelien Thierry, Jonathan Thieuleux