Search for "Ray" returned 3332 results
32 min
Finding the Weak Crypto Needle in a Byte Haystack
Automatic detection of key-reuse vulnerabilities
46 min
You can -j REJECT but you can not hide: Global scanning of the IPv6 Internet
Finding interesting targets in 128bit of entropy
55 min
ZombieLoad Attack
Leaking Your Recent Memory Operations on Intel CPUs
61 min
Quantum Computing: Are we there yet?
An introduction to quantum computing and a review of the…
35 min
Internet of toilets
Trends in the sanitarian territory
47 min
Finding Vulnerabilities in Internet-Connected Devices
A Beginner’s Guide
26 min
Humans as software extensions
Will You Be My Plugin?
29 min
Infocalypse now: P0wning stuff is not enough
Several failure modes of the hacker scene
29 min
Hacking collective as a laboratory
Hackers' knowledge studied by sociologist of science
32 min