10. WOOT 2016: Austin, TX, USA

Cryptographic Attacks

Mobile Threats

Mobile Threats, Part II (The Revenge)

Evading Malware Detection

Same Vuln; Different System (Large-Scale Analyses)

Creative Denial of Service

Internet of Broken Things

Vehicle Hacking

maintained by Schloss Dagstuhl LZI at University of Trier