Search for "21" returned 4519 results
58 min
Virtual Machine Introspection
From the Outside Looking In
62 min
Superheroes Still Need Phoneboxes
The art of making a free phonebox and the culture of…
60 min
From Computation to Consciousness
How computation helps to explain mind, universe and…
63 min
The Cloud Conspiracy 2008-2014
how the EU was hypnotised that the NSA did not exist
54 min
How hackers grind an MMORPG: by taking it apart!
An introduction to reverse engineering network protocols
61 min
Untrusting the CPU
A proposal for secure computing in an age where we cannot…
60 min
Check your privileges!
How to drop more of your privileges to reduce attack…
69 min
Telescope Making
How to make your own telescope
51 min
Ecuador: how an authoritarian government is fooling the entire world
Guess what? The Government of Rafael Correa actually is…
60 min
Sneaking In Network Security
Enforcing strong network segmentation, without anyone…
60 min
Hacking Reality
Mixed Reality and multi-sensory communication
58 min
Decoding Contactless (Card) Payments
An Exploration of NFC Transactions and Explanation How…
58 min
When hardware must „just work“
An inside look at x86 CPU design
58 min
Baseband Exploitation in 2013
Hexagon challenges
62 min
Corporate surveillance, digital tracking, big data & privacy
How thousands of companies are profiling, categorizing,…
55 min
White-Box Cryptography
Survey
57 min