-
Hopeless Relay Protection for Substation Automation
– by Kirill Nesterov, Alexander Tlyapov
-
Transforming Open Source to Open Access in Closed Applications
– by Brian Gorenc, Jasiel Spelman, Abdul-Aziz Hariri
-
r2m2
– by Guillaume VALADON / guedou
-
Hackable Security Modules Reversing and exploiting a FIPS 140-2 lvl 3 HSM firmware
– by Fotis Loukos
-
GRAP: define and match graph patterns within binaries
– by Aurelien Thierry, Jonathan Thieuleux