[+] [2011] Dissecting Java Server Faces for Penetration Testing (Applied Research) | PDF
[+] [2011] Digging inside VxWorks (OS + Firmware) – The Holistic Security (Applied Research) | PDF
[+] [2010] Design Inaccuracy – Cross Link Authoring Flaw – Scribd Flaw – iPaper Platform | COSEINC Publication
[+] [2009] PDF Silent HTTP Form Repurposing Attacks | PDF
[+] [2009] Evading Web XSS Filters through Word (MS Office) in Enterprise Web Applications | PDF
[+] [2009] Internet Explorer 8 : Anti Spoofing is a Myth – Broken Status Address Bar Link Integrity | PDF
[+] [2008] Paranaormal Fallacy – SE Automated Scanning Anomaly | PDF
[+] [2007] Information Prone LDAP Garbage Dumps | PDF
[+] [2007] End Point Malfeasance | PDF
[+] [2007] Exploiting JSON : 7 Attack Shots | PDF
[+] [2007] Paradox of Web Leeching : Semantics | PDF
[+] [2007] Rogue XML Specifications | PDF
[+] [2007] Binary JSON : Insecurity in Serialization | PDF
[+] [2007] JNLP Security Convergence | PDF
[+] [2007] Double Trap XSS Injection | PDF
[+] [2007] Cognitive Cause Of Metacharacter Spamdexing Bug | PDF
[+] [2007] Google Metacharacter [*] SpamDexxing Bug | PDF
[+] [2007] Infection through Extension functions| PDF
[+] [2008] Vulnerability Risk Randomization : Wireless Networks | PDF
[+] [2007] Microsoft Windows XP Svchost : Dissecting The Internals | PDF
[+] [2007] Scrutinizing SIP Payloads : Traversing Attack Vecors in VOIP | PDF
[+] [2007] Bug Wars : The Lost Matrix of Security Vectors| PDF