Search for ".hev" returned 1880 results

The Machine To Be Another
30 min

The Machine To Be Another

Exploring identity and empathy through neuroscience,…

Baseband Exploitation in 2013
58 min

Baseband Exploitation in 2013

Hexagon challenges

TrustZone-M(eh): Breaking ARMv8-M's security
57 min

TrustZone-M(eh): Breaking ARMv8-M's security

Hardware attacks on the latest generation of ARM Cortex-M…

Telescope Making
69 min

Telescope Making

How to make your own telescope

Why is GPG "damn near unusable"?
60 min

Why is GPG "damn near unusable"?

An overview of usable security research

Numerical Air Quality Modeling Systems
61 min

Numerical Air Quality Modeling Systems

a journey from emissions to exposure

Hacking Reality
60 min

Hacking Reality

Mixed Reality and multi-sensory communication

FIDO2
48 min

FIDO2

the superior Multi Factor Authentication Framework

Correcting copywrongs
61 min

Correcting copywrongs

European copyright reform is finally on the horizon

How to Break PDFs
58 min

How to Break PDFs

Breaking PDF Encryption and PDF Signatures

A deep dive into the world of DOS viruses
38 min

A deep dive into the world of DOS viruses

Explaining in detail just how those little COM files…

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities