Search for "llm" returned 276 results
62 min
Kyber and Post-Quantum Crypto
How does it work?
58 min
Baseband Exploitation in 2013
Hexagon challenges
31 min
TrustZone is not enough
Hijacking debug components for embedded security
58 min
How risky is the software you use?
CITL: Quantitative, Comparable Software Risk Reporting
60 min
Lockpicking in the IoT
...or why adding BTLE to a device sometimes isn't smart at…
54 min
Attacking Chrome IPC
Reliably finding bugs to escape the Chrome sandbox
41 min
Breathing Life into Legacy: An Open-Source Emulator of Legacy Apple Devices
A Dive into Reverse Engineering and Understanding the iPod…
61 min
How Alice and Bob meet if they don't like onions
Survey of Network Anonymisation Techniques
40 min
Hacking the Climate
Mit Climate Engineering raus aus der Klimakrise?
63 min
Analyze the Facebook algorithm and reclaim data sovereignty
Algorithms define your priorities. Who else besides you can…
57 min
A Dozen Years of Shellphish
From DEFCON to the DARPA Cyber Grand Challenge
60 min