Search for "10" returned 5075 results

Damn Vulnerable Chemical Process
61 min

Damn Vulnerable Chemical Process

Exploitation in a new media

Attribution revolution
55 min

Attribution revolution

Turning copyright upside-down with metadata

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

The GNU Name System
51 min

The GNU Name System

A Decentralized PKI For Social Movements

Visiting The Bear Den
59 min

Visiting The Bear Den

A Journey in the Land of (Cyber-)Espionage

Rock' em Graphic Cards
56 min

Rock' em Graphic Cards

Introduction to Heterogeneous Parallel Programming

Graphs, Drones & Phones
55 min

Graphs, Drones & Phones

The role of social-graphs for Drones in the War on Terror.

Kernel Tracing With eBPF
54 min

Kernel Tracing With eBPF

Unlocking God Mode on Linux

Haft für Whistleblower?
34 min

Haft für Whistleblower?

Demokratiefeindliches Strafrecht: Die Datenhehlerei gem. §…

Cyber Necromancy
55 min

Cyber Necromancy

Reverse Engineering Dead Protocols

Scuttlebutt
34 min

Scuttlebutt

The decentralized P2P gossip protocol