Search for "17" returned 4553 results
61 min
Code Pointer Integrity
... or how we battle the daemons of memory safety
67 min
The Maker movement meets patent law
How many windows are open in the patent fortress
59 min
Hardsploit: A Metasploit-like tool for hardware hacking
A complete toolbox for IoT security
57 min
A Dozen Years of Shellphish
From DEFCON to the DARPA Cyber Grand Challenge
45 min
To Protect And Infect
The militarization of the Internet
61 min
Computational Meta-Psychology
An Artificial Intelligence exploration into the creation of…
61 min
CAESAR and NORX
Developing the Future of Authenticated Encryption
59 min
Zwischen supersicherer Verschlüsselung und Klartext liegt nur ein falsches Bit
Ein Streifzug durch die Fehler in der Kryptografie
46 min