Search for "15" returned 4794 results
55 min
White-Box Cryptography
Survey
58 min
Decoding Contactless (Card) Payments
An Exploration of NFC Transactions and Explanation How…
58 min
When hardware must „just work“
An inside look at x86 CPU design
57 min
How I Learned to Stop Reinventing and Love the Wheels
or having FUN with (home/hackerspace) robotics
60 min
Beyond Anti Evil Maid
Making it easier to avoid low-level compromise, and why…
44 min
What the cyberoptimists got wrong - and what to do about it
Tech unexeptionalism and the monopolization of every…
51 min
Uncovering vulnerabilities in Hoermann BiSecur
An AES encrypted radio system
59 min
Memory Deduplication: The Curse that Keeps on Giving
A tale of 3 different memory deduplication based…
58 min
Überwachen und Sprache
How to do things with words
59 min
De-anonymizing Programmers
Large Scale Authorship Attribution from Executable Binaries…
63 min
Through a PRISM, Darkly
Everything we know about NSA spying
63 min