Search for "51" returned 3733 results

Building and Breaking Wireless Security
29 min

Building and Breaking Wireless Security

Wireless Physical Layer Security & More...

Graphs, Drones & Phones
55 min

Graphs, Drones & Phones

The role of social-graphs for Drones in the War on Terror.

Revisiting SSL/TLS Implementations
55 min

Revisiting SSL/TLS Implementations

New Bleichenbacher Side Channels and Attacks

Speaking Fiction To Power
43 min

Speaking Fiction To Power

Strategies and tactics to ‘hack’ public spaces and social…

The Zcash anonymous cryptocurrency
31 min

The Zcash anonymous cryptocurrency

or zero-knowledge succinct non-interactive arguments of…

Welcome to the Anthropocene?
28 min

Welcome to the Anthropocene?

(Did) We Accidentally a New Geological Epoch(?)

Security Nightmares
101 min

Security Nightmares

Damit Sie auch morgen schlecht von Ihrem Computer träumen.

QRtistry
28 min

QRtistry

One can create art and beauty with … pixels

Eye Wear Computing
32 min

Eye Wear Computing

Augmenting the Human Mind

Coding your body
32 min

Coding your body

How to decipher the messages of your body

Code BROWN in the Air
37 min

Code BROWN in the Air

A systemic update of sensitive information that you sniff…

AMD x86 SMU firmware analysis
54 min

AMD x86 SMU firmware analysis

Do you care about Matroshka processors?

Blinkenrocket!
29 min

Blinkenrocket!

How to make a community project fly

No PoC? No Fix! - A sad Story about Bluetooth Security
43 min

No PoC? No Fix! - A sad Story about Bluetooth Security

It is just a broken memcpy in the Bluetooth stack. Do we…

Attribution revolution
55 min

Attribution revolution

Turning copyright upside-down with metadata

Kernel Tracing With eBPF
54 min

Kernel Tracing With eBPF

Unlocking God Mode on Linux