Search for "8emo" returned 613 results
46 min
SELECT code_execution FROM * USING SQLite;
--Gaining code execution using a malicious SQLite database
57 min
How I Learned to Stop Reinventing and Love the Wheels
or having FUN with (home/hackerspace) robotics
58 min
Baseband Exploitation in 2013
Hexagon challenges
60 min
Beyond Anti Evil Maid
Making it easier to avoid low-level compromise, and why…
49 min
Open Source Firmware
Eine Liebesgeschichte
62 min
Getting software right with properties, generated tests, and proofs
Evolve your hack into robust software!
45 min
Triggering Deep Vulnerabilities Using Symbolic Execution
Deep program analysis without the headache
61 min
CAESAR and NORX
Developing the Future of Authenticated Encryption
53 min
The Ultimate Amiga 500 Talk
Amiga Hardware Design And Programming
63 min
Through a PRISM, Darkly
Everything we know about NSA spying
60 min
Lets break modern binary code obfuscation
A semantics based approach
60 min
The Exploration and Exploitation of an SD Memory Card
by xobs & bunnie
101 min
Chaos Communication Slam
Technische Liebesgedichte & Horrorgeschichten im…
61 min
Projekt Hannah
Ein open-source Hardware- und Software-Design für…
61 min
Trustworthy secure modular operating system engineering
fun(ctional) operating system and security protocol…
62 min
Deine Rechte sind in diesen Freihandelsabkommen nicht verfügbar
Der Protest gegen TTIP und CETA
54 min