Search for "big data"

Inside the Fake Like Factories
60 min

Inside the Fake Like Factories

How thousands of Facebook, You Tube and Instagram pages…

An introduction to Firmware Analysis
40 min

An introduction to Firmware Analysis

Techniques - Tools - Tricks

How risky is the software you use?
58 min

How risky is the software you use?

CITL: Quantitative, Comparable Software Risk Reporting

Iridium Update
56 min

Iridium Update

more than just pagers

Are all BSDs created equally?
58 min

Are all BSDs created equally?

A survey of BSD kernel vulnerabilities.

The Layman's Guide to Zero-Day Engineering
57 min

The Layman's Guide to Zero-Day Engineering

A demystification of the exploit development lifecycle

Console Hacking 2016
53 min

Console Hacking 2016

PS4: PC Master Race

CIA vs. Wikileaks
58 min

CIA vs. Wikileaks

Intimiditation surveillance and other tactics observed and…

X Security
61 min

X Security

It's worse than it looks

Boot2root
62 min

Boot2root

Auditing Boot Loaders by Example

Unlocking the Road Ahead: Automotive Digital Forensics
36 min

Unlocking the Road Ahead: Automotive Digital Forensics

A deep dive into an underrepresented research area

Decoding the LoRa PHY
64 min

Decoding the LoRa PHY

Dissecting a Modern Wireless Network for the Internet of…

Taming the Chaos: Can we build systems that actually work?
58 min

Taming the Chaos: Can we build systems that actually work?

Possible paths from today's ghastly hackery to what…