2017-00001: [paper]?SoK: Systematic Classi?cation of Side-Channel Attacks on Mobile Devices
2017-00002: [article]?2016’s Mobile Threat Landscape Brings Diversity, Scale, and Scope - TrendLabs Security Intelligence Blog
2017-00003: [article] Reversing the Parrot SkyController Firmware
2017-00004: [article] Exploiting IoT enabled BLE smart bulb security - IoT Exploitation and Mobile Security Pentesting by Attify
2017-00005: [article] Danfoss Wireless Thermostat Hacking – Part One | Hacking at Home
2017-00006: [Thesis] ON GENERATING GADGET CHAINS FOR RETURN-ORIENTED PROGRAMMING
2017-00007: [paper]?SoK: Exploiting Network Printers
2017-00008: [Thesis] IMPROVING MOBILE-MALWARE INVESTIGATIONS WITH STATIC AND DYNAMIC CODE ANALYSIS TECHNIQUES
2017-00009: [paper] REV.NG : A Unified Binary Analysis Framework to Recover CFGs and Function Boundaries
2017-00010: [paper] Reverse engineering a Java Card memory management algorithm
2017-00011: [article] 利用漏洞解鎖錘子T1/2手機的bootloader
2017-00012: [article] Owning a Locked OnePlus 3/3T: Bootloader Vulnerabilities
2017-00013: [paper]?Cold Boot Attacks are Still Hot: Security Analysis of Memory Scramblers in Modern Processors
2017-00014: [paper]?Ramblr: Making Reassembly Great Again
2017-00015: [paper]?Show Me the Money! Finding Flawed Implementations of Third-party In-app Payment in Android Apps
2017-00016: [paper]?Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit
2017-00017: [paper]?ASLR^Cache: Practical Cache Attacks on the MMU
2017-00018: [paper]?GRIFFIN: Guarding Control Flows Using Intel Processor Trace
2017-00019: [paper]?Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping
2017-00020: [paper] SPAIN: Security Patch Analysis for Binaries Towards Understanding the Pain and Pills
2017-00021: [paper]?Collusive Data Leak and More: Large-scale Threat Analysis of Inter-app Communications
2017-00022: [paper]?LibD: Scalable and Precise Third-party Library Detection in Android Markets
2017-00023: [paper]?Android Privacy C(R)ache: Reading your External Storage and Sensors for Fun and Pro?t
2017-00024: [paper]?Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying
2017-00025: [paper]?WindowGuard: Systematic Protection of GUI Security in Android
2017-00026: [paper]?Nail: A Practical Tool for Parsing and Generating Data Formats
2017-00027: [paper]?Operating Systems for Low-End Devices in the Internet of Things: a Survey
2017-00028: [book]?SEI CERT C Coding Standard: Rules for Developing Safe, Reliable, and Secure Systems (2016 Edition)
2017-00029: [book]?SEI CERT C++ Coding Standard: Rules for Developing Safe, Reliable, and Secure Systems in C++ (2016 Edition)
2017-00030: [slides]?From off-the-shelf embedded devices to research platforms. Two case studies: a PLC and a SSD
2017-00031: [article]?How I Hacked an Android App to Get Free Beer
2017-00032: [paper]?Travioli: A Dynamic Analysis for Detecting Data-Structure Traversals
2017-00033: [paper]?Strict Virtual Call Integrity Checking for C++ Binaries