Search for "10" returned 5081 results

Triggering Deep Vulnerabilities Using Symbolic Execution
45 min

Triggering Deep Vulnerabilities Using Symbolic Execution

Deep program analysis without the headache

What does Big Brother see, while he is watching?
60 min

What does Big Brother see, while he is watching?

Uncovering images from the secret Stasi archives.

Low Cost High Speed Photography
60 min

Low Cost High Speed Photography

Using microcontrollers to capture the blink of an eye for…

Superheroes Still Need Phoneboxes
62 min

Superheroes Still Need Phoneboxes

The art of making a free phonebox and the culture of…

Web-based Cryptojacking in the Wild
39 min

Web-based Cryptojacking in the Wild

When your browser is mining coins for other people

Check your privileges!
60 min

Check your privileges!

How to drop more of your privileges to reduce attack…

How hackers grind an MMORPG: by taking it apart!
54 min

How hackers grind an MMORPG: by taking it apart!

An introduction to reverse engineering network protocols

Untrusting the CPU
61 min

Untrusting the CPU

A proposal for secure computing in an age where we cannot…

A world without blockchain
42 min

A world without blockchain

How (inter)national money transfers works

Ich sehe, also bin ich ... Du
60 min

Ich sehe, also bin ich ... Du

Gefahren von Kameras für (biometrische)…

Die göttliche Informatik
61 min

Die göttliche Informatik

Die Informatik löst formale (mathematisch modellierte)…

Confessions of a future terrorist
58 min

Confessions of a future terrorist

A rough guide to over-regulating free speech with…