Search for "c-atre" returned 3750 results

Triggering Deep Vulnerabilities Using Symbolic Execution
45 min

Triggering Deep Vulnerabilities Using Symbolic Execution

Deep program analysis without the headache

CounterStrike
46 min

CounterStrike

Lawful Interception

Community
62 min

Community

Social Life & Life in the early 21st century

Axoloti
29 min

Axoloti

DIY audio signal processing

What Price the Upload Filter?
54 min

What Price the Upload Filter?

The history and costs of government exceptional access

Attribution revolution
55 min

Attribution revolution

Turning copyright upside-down with metadata

The Cloud Conspiracy 2008-2014
63 min

The Cloud Conspiracy 2008-2014

how the EU was hypnotised that the NSA did not exist

AMD x86 SMU firmware analysis
54 min

AMD x86 SMU firmware analysis

Do you care about Matroshka processors?

Cyber Necromancy
55 min

Cyber Necromancy

Reverse Engineering Dead Protocols

Information Control and Strategic Violence
30 min

Information Control and Strategic Violence

How governments use censorship and surveillance as part of…

goto fail;
63 min

goto fail;

exploring two decades of transport layer insecurity

The Fight for Encryption in 2016
60 min

The Fight for Encryption in 2016

Crypto fight in the Wake of Apple v. FBI

Seidenstraße
48 min

Seidenstraße

The Making of…