Search for "Tom Wills" returned 4761 results

The Fight for Encryption in 2016
60 min

The Fight for Encryption in 2016

Crypto fight in the Wake of Apple v. FBI

QRtistry
28 min

QRtistry

One can create art and beauty with … pixels

Top X* usability obstacles
59 min

Top X* usability obstacles

*(will be specified later based on usability test with…

Freude ist nur ein Mangel an Information
67 min

Freude ist nur ein Mangel an Information

Ein Demotivationsworkshop zur politischen Lage.

Check your privileges!
60 min

Check your privileges!

How to drop more of your privileges to reduce attack…

3D Casting Aluminum
55 min

3D Casting Aluminum

Too Much Fun with Microwaves

Recharge your batteries with us
39 min

Recharge your batteries with us

– an empowering journey through the energy transition

Virtual Secure Boot
51 min

Virtual Secure Boot

Secure Boot support in qemu, kvm and ovmf.

Extracting keys from FPGAs, OTP Tokens and Door Locks
41 min

Extracting keys from FPGAs, OTP Tokens and Door Locks

Side-Channel (and other) Attacks in Practice

Reconstructing narratives
63 min

Reconstructing narratives

transparency in the service of justice

Code Pointer Integrity
61 min

Code Pointer Integrity

... or how we battle the daemons of memory safety

Security of the IC Backside
59 min

Security of the IC Backside

The future of IC analysis

Why is GPG "damn near unusable"?
60 min

Why is GPG "damn near unusable"?

An overview of usable security research

What could possibly go wrong with <insert x86 instruction here>?
55 min

What could possibly go wrong with <insert x86 instruction here>?

Side effects include side-channel attacks and bypassing…