Search for "zem" returned 4002 results

Inside Field Station Berlin Teufelsberg
55 min

Inside Field Station Berlin Teufelsberg

The story of the NSA listening post – told by an ex-SIGINT…

RFID Treehouse of Horror
58 min

RFID Treehouse of Horror

Hacking City-Wide Access Control Systems

Hunting the Sigfox: Wireless IoT Network Security
38 min

Hunting the Sigfox: Wireless IoT Network Security

Dissecting the radio protocol of Sigfox, the global…

Kernel Tracing With eBPF
54 min

Kernel Tracing With eBPF

Unlocking God Mode on Linux

Everything you want to know about x86 microcode, but might have been afraid to ask
57 min

Everything you want to know about x86 microcode, but might have been afraid to ask

An introduction into reverse-engineering x86 microcode and…

Glitching For n00bs
58 min

Glitching For n00bs

A Journey to Coax Out Chips' Inner Secrets

When hardware must „just work“
58 min

When hardware must „just work“

An inside look at x86 CPU design

Untrusting the CPU
61 min

Untrusting the CPU

A proposal for secure computing in an age where we cannot…

Modeling and Simulation of Physical Systems for Hobbyists
38 min

Modeling and Simulation of Physical Systems for Hobbyists

Essential Tools for Developing, Testing and Debugging…

goto fail;
63 min

goto fail;

exploring two decades of transport layer insecurity

The Ghost in the Machine
62 min

The Ghost in the Machine

An Artificial Intelligence Perspective on the Soul

Extracting keys from FPGAs, OTP Tokens and Door Locks
41 min

Extracting keys from FPGAs, OTP Tokens and Door Locks

Side-Channel (and other) Attacks in Practice

Intel Management Engine deep dive
60 min

Intel Management Engine deep dive

Understanding the ME at the OS and hardware level