Search for "11" returned 4572 results

Triggering Deep Vulnerabilities Using Symbolic Execution
45 min

Triggering Deep Vulnerabilities Using Symbolic Execution

Deep program analysis without the headache

WTF DJI, UAV CTF?!
43 min

WTF DJI, UAV CTF?!

A hacker's view at commercial drone security

Ten years after ‚We Lost The War‘
61 min

Ten years after ‚We Lost The War‘

The future does not look much brighter than ten years ago.…

„Nach bestem Wissen und Gewissen“ – Floskeln in der Politik
60 min

„Nach bestem Wissen und Gewissen“ – Floskeln in der Politik

Politische Phrasologie – warum man aus dem ganzen Zeug, das…

Ich sehe, also bin ich ... Du
60 min

Ich sehe, also bin ich ... Du

Gefahren von Kameras für (biometrische)…

All cops are broadcasting
47 min

All cops are broadcasting

Obtaining the secret TETRA primitives after decades in the…

Flutter
48 min

Flutter

performant cross platform development using modern…

No Love for the US Gov.
53 min

No Love for the US Gov.

Why Lauri Love’s case is even more important than you…

avatar²
55 min

avatar²

Towards an open source binary firmware analysis framework

Quantum Computing: Are we there yet?
61 min

Quantum Computing: Are we there yet?

An introduction to quantum computing and a review of the…

AMD x86 SMU firmware analysis
54 min

AMD x86 SMU firmware analysis

Do you care about Matroshka processors?