Search for "28" returned 4264 results
58 min
When hardware must „just work“
An inside look at x86 CPU design
42 min
Union Busting
What is it and why you should care
59 min
De-anonymizing Programmers
Large Scale Authorship Attribution from Executable Binaries…
58 min
Baseband Exploitation in 2013
Hexagon challenges
60 min
Concepts for global TSCM
getting out of surveillance state mode
58 min
Angry weather ?
How human-induced climate change affects weather (& how we…
60 min
Ein Abgrund von Landesverrat
Wie es dazu kam und was daraus zu lernen ist
62 min
Corporate surveillance, digital tracking, big data & privacy
How thousands of companies are profiling, categorizing,…
60 min
Beyond Anti Evil Maid
Making it easier to avoid low-level compromise, and why…
59 min
Memory Deduplication: The Curse that Keeps on Giving
A tale of 3 different memory deduplication based…
58 min
The Magic World of Searchable Symmetric Encryption
A brief introduction to search over encrypted data
58 min
Paypals War on Terror
A Historical Re-Enactment of the PayPal14
58 min