Search for "llm" returned 276 results

Baseband Exploitation in 2013
58 min

Baseband Exploitation in 2013

Hexagon challenges

TrustZone is not enough
31 min

TrustZone is not enough

Hijacking debug components for embedded security

How risky is the software you use?
58 min

How risky is the software you use?

CITL: Quantitative, Comparable Software Risk Reporting

Lockpicking in the IoT
60 min

Lockpicking in the IoT

...or why adding BTLE to a device sometimes isn't smart at…

Attacking Chrome IPC
54 min

Attacking Chrome IPC

Reliably finding bugs to escape the Chrome sandbox

How Alice and Bob meet if they don't like onions
61 min

How Alice and Bob meet if they don't like onions

Survey of Network Anonymisation Techniques

Hacking the Climate
40 min

Hacking the Climate

Mit Climate Engineering raus aus der Klimakrise?

Analyze the Facebook algorithm and reclaim data sovereignty
63 min

Analyze the Facebook algorithm and reclaim data sovereignty

Algorithms define your priorities. Who else besides you can…

A Dozen Years of Shellphish
57 min

A Dozen Years of Shellphish

From DEFCON to the DARPA Cyber Grand Challenge

avatar²
55 min

avatar²

Towards an open source binary firmware analysis framework