Search for "15" returned 4787 results
45 min
Triggering Deep Vulnerabilities Using Symbolic Execution
Deep program analysis without the headache
55 min
Revisiting SSL/TLS Implementations
New Bleichenbacher Side Channels and Attacks
61 min
Damn Vulnerable Chemical Process
Exploitation in a new media
19 min
Fooled by the Website Carbon Calculator
Green Coding & Measuring the Environmental Impacts of IT
45 min
SearchWing
Open source drones for Search & Rescue
53 min
No Love for the US Gov.
Why Lauri Love’s case is even more important than you…
95 min
The Time is Right
Ein Science-Fiction-Theaterstück
54 min
AMD x86 SMU firmware analysis
Do you care about Matroshka processors?
55 min
ZombieLoad Attack
Leaking Your Recent Memory Operations on Intel CPUs
56 min
Rock' em Graphic Cards
Introduction to Heterogeneous Parallel Programming
59 min
Visiting The Bear Den
A Journey in the Land of (Cyber-)Espionage
55 min
Graphs, Drones & Phones
The role of social-graphs for Drones in the War on Terror.
61 min