Search for "Ben H." returned 5851 results
36 min
Supply Chain Security and Security Automation Data
lost in a maze of XML and JSON
24 min
Hacking the Quincy Drawing Robot
(and possible win one!)
51 min
Uncovering vulnerabilities in Hoermann BiSecur
An AES encrypted radio system
60 min
Programming DNA
A 2-bit language for engineering biology
49 min
Syscall proxying fun and applications
Introduction to syscall proxying and applications for in…
30 min
Privacy and Consumer Markets
Reversing the Surveillance Business Model
50 min
Data Analysis in Terabit Ethernet Traffic
Solutions for monitoring and lawful interception within a…
40 min
Musikvideos durch KI
Wie lässt sich Text (und mehr) mit KI zu Musik machen?
37 min
Hacking (with) a TPM
Don't ask what you can do for TPMs, Ask what TPMs can do…
60 min
Open Source is Insufficient to Solve Trust Problems in Hardware
How Betrusted Aims to Close the Hardware TOCTOU Gap
44 min