Search for "big data"

CAESAR and NORX
61 min

CAESAR and NORX

Developing the Future of Authenticated Encryption

Reconstructing narratives
63 min

Reconstructing narratives

transparency in the service of justice

Verified Firewall Ruleset Verification
32 min

Verified Firewall Ruleset Verification

Math, Functional Programming, Theorem Proving, and an…

Check your privileges!
60 min

Check your privileges!

How to drop more of your privileges to reduce attack…

QRtistry
28 min

QRtistry

One can create art and beauty with … pixels

Memsad
61 min

Memsad

why clearing memory is hard.

Unpatchable
60 min

Unpatchable

Living with a vulnerable implanted device

Nerds in the news
31 min

Nerds in the news

Spending a year coding in a newsroom

The Economic Consequences of Internet Censorship
31 min

The Economic Consequences of Internet Censorship

Why Censorship is a Bad Idea for Everyone

Beyond your cable modem
60 min

Beyond your cable modem

How not to do DOCSIS networks

Code BROWN in the Air
37 min

Code BROWN in the Air

A systemic update of sensitive information that you sniff…

An ultrashort history of ultrafast imaging
60 min

An ultrashort history of ultrafast imaging

Featuring the shortest movies and the largest lasers

AMD x86 SMU firmware analysis
54 min

AMD x86 SMU firmware analysis

Do you care about Matroshka processors?

The Snowden Refugees under Surveillance in Hong Kong
66 min

The Snowden Refugees under Surveillance in Hong Kong

A Rapidly Emerging Police State and Imminent Deportation to…

Safe and Secure Drivers in High-Level Languages
61 min

Safe and Secure Drivers in High-Level Languages

How to write PCIe drivers in Rust, go, C#, Swift, Haskell,…

Policing the Romantic Crowd
38 min

Policing the Romantic Crowd

Velocipedes and Face Recognition

Pushing the frontiers of Information Extraction:
63 min

Pushing the frontiers of Information Extraction:

A Strategy for for Identifying Calls for Action in Texts…