| 2016-08-11 | Keyringer: encrypted and distributed secret sharing software | Bincker | 2044 | |
| 2016-08-11 | Reversing a Finite Field Multiplication Optimization | Bincker | 3021 | |
| 2016-08-11 | Implementing a Custom Directive Handler in Clang | Bincker | 2661 | |
| 2016-08-11 | Binmap: a system scanner | Bincker | 2697 | |
| 2016-08-11 | SCAF - source-code-analysis-framework | Bincker | 2726 | |
| 2016-08-11 | A brief survey of Fully Homomorphic Encryption, computing on encrypted data | Bincker | 2375 | |
| 2016-08-11 | Xen exploitation part 3: XSA-182, Qubes escape | Bincker | 2194 | |
| 2016-08-11 | Xen exploitation part 2: XSA-148, from guest to host | Bincker | 1861 | |
| 2016-08-11 | Xen exploitation part 1: XSA-105, from nobody to root | Bincker | 1881 | |
| 2016-08-11 | Cracking Orcus RAT | Bincker | 2806 | |