Search for "19" returned 4468 results
57 min
TrustZone-M(eh): Breaking ARMv8-M's security
Hardware attacks on the latest generation of ARM Cortex-M…
60 min
Quantum Cryptography
from key distribution to position-based cryptography
57 min
Everything you want to know about x86 microcode, but might have been afraid to ask
An introduction into reverse-engineering x86 microcode and…
51 min
Ecuador: how an authoritarian government is fooling the entire world
Guess what? The Government of Rafael Correa actually is…
60 min
Attacking end-to-end email encryption
Efail, other attacks and lessons learned.
59 min
Pointing Fingers at 'The Media'
The Bundestagswahl 2017 and Rise of the AfD
34 min
Social Cooling - big data’s unintended side effect
How the reputation economy is creating data-driven…
57 min
A New Dark Age
Turbulence, Big Data, AI, Fake News, and Peak Knowledge
55 min
The Gospel of IRMA
Attribute Based Credentials in Practice
58 min
Protecting Your Privacy at the Border
Traveling with Digital Devices in the Golden Age of…
60 min
Beyond Anti Evil Maid
Making it easier to avoid low-level compromise, and why…
60 min
Concepts for global TSCM
getting out of surveillance state mode
62 min