Search for "13" returned 4825 results
57 min
The Layman's Guide to Zero-Day Engineering
A demystification of the exploit development lifecycle
44 min
Disclosure DOs, Disclosure DON'Ts
Pragmatic Advice for Security Researchers
47 min
Bug class genocide
Applying science to eliminate 100% of buffer overflows
53 min
The Ultimate Amiga 500 Talk
Amiga Hardware Design And Programming
62 min
Transhuman Expression
Interdisciplinary research in Painting and Robotics. with…
63 min
Das nützlich-unbedenklich Spektrum
Können wir Software bauen, die nützlich /und/ unbedenklich…
60 min
Breaking Baryons
On the Awesomeness of Particle Accelerators and Colliders
64 min
Decoding the LoRa PHY
Dissecting a Modern Wireless Network for the Internet of…
63 min
Don't stop 'til you feel it
Artistic interventions in climate change
32 min
Finding the Weak Crypto Needle in a Byte Haystack
Automatic detection of key-reuse vulnerabilities
49 min
BREACH in Agda
Security notions, proofs and attacks using dependently…
60 min
net neutrality: days of future past?
Taking stock after two years of net neutrality in the…
33 min
Watching the changing Earth
warning: gravity ahead
60 min