Search for "918" returned 2160 results

Triggering Deep Vulnerabilities Using Symbolic Execution
45 min

Triggering Deep Vulnerabilities Using Symbolic Execution

Deep program analysis without the headache

Tractors, Rockets and the Internet in Belarus
43 min

Tractors, Rockets and the Internet in Belarus

How belarusian authoritarian regime is using technologies…

Hacking (with) a TPM
37 min

Hacking (with) a TPM

Don't ask what you can do for TPMs, Ask what TPMs can do…

Gespräch
61 min

Gespräch

Eine digitale Währung mit den Eigenschaften von Bargeld –…

Firmware Fat Camp
42 min

Firmware Fat Camp

Embedded Security Using Binary Autotomy

„Nach bestem Wissen und Gewissen“ – Floskeln in der Politik
60 min

„Nach bestem Wissen und Gewissen“ – Floskeln in der Politik

Politische Phrasologie – warum man aus dem ganzen Zeug, das…

Free Electron Lasers
59 min

Free Electron Lasers

...or why we need 17 billion Volts to make a picture.

WTF DJI, UAV CTF?!
43 min

WTF DJI, UAV CTF?!

A hacker's view at commercial drone security