Search for "Murdoc"
Vulnerabilities in the EMV Protocol
Tampering the Tamper-Proof
Keeping your enemies close
Hot or Not: Defeating anonymity by monitoring clock skew to…
Creation and detection of IP steganography for covert…
Reverse-engineering currency detection systems