Search for ".egd" returned 1555 results

Triggering Deep Vulnerabilities Using Symbolic Execution
45 min

Triggering Deep Vulnerabilities Using Symbolic Execution

Deep program analysis without the headache

Wheel of Fortune
36 min

Wheel of Fortune

Analyzing Embedded OS Random Number Generators

Lifting the Fog on Red Star OS
60 min

Lifting the Fog on Red Star OS

A deep dive into the surveillance features of North Korea's…

The Layman's Guide to Zero-Day Engineering
57 min

The Layman's Guide to Zero-Day Engineering

A demystification of the exploit development lifecycle

No PoC? No Fix! - A sad Story about Bluetooth Security
43 min

No PoC? No Fix! - A sad Story about Bluetooth Security

It is just a broken memcpy in the Bluetooth stack. Do we…

BREACH in Agda
49 min

BREACH in Agda

Security notions, proofs and attacks using dependently…

An ultrashort history of ultrafast imaging
60 min

An ultrashort history of ultrafast imaging

Featuring the shortest movies and the largest lasers

Verified Firewall Ruleset Verification
32 min

Verified Firewall Ruleset Verification

Math, Functional Programming, Theorem Proving, and an…