Search for "林水成董事長股份tVwo" returned 1557 results

Growing Up Software Development
31 min

Growing Up Software Development

From Hacker Culture to the Software of the Future

SELECT code_execution FROM * USING SQLite;
46 min

SELECT code_execution FROM * USING SQLite;

--Gaining code execution using a malicious SQLite database

Rocket science – how hard can it be?
65 min

Rocket science – how hard can it be?

First steps into space with sounding rockets

Untrusting the CPU
61 min

Untrusting the CPU

A proposal for secure computing in an age where we cannot…

Lifting the Fog on Red Star OS
60 min

Lifting the Fog on Red Star OS

A deep dive into the surveillance features of North Korea's…

Toward a Cognitive "Quantified Self"
49 min

Toward a Cognitive "Quantified Self"

Activity Recognition for the Mind

Electronic Bank Robberies
56 min

Electronic Bank Robberies

Stealing Money from ATMs with Malware

Drones
60 min

Drones

Autonomous flying vehicles, where are we and where are we…

Cyber Necromancy
55 min

Cyber Necromancy

Reverse Engineering Dead Protocols

The Great Escape of ESXi
40 min

The Great Escape of ESXi

Breaking Out of a Sandboxed Virtual Machine

Going Deep Underground to Watch the Stars
47 min

Going Deep Underground to Watch the Stars

Neutrino Astronomy with Hyper-Kamiokande

Provable Security
59 min

Provable Security

How I learned to stop worrying and love the backdoor

De-anonymizing Programmers
59 min

De-anonymizing Programmers

Large Scale Authorship Attribution from Executable Binaries…

Triggering Deep Vulnerabilities Using Symbolic Execution
45 min

Triggering Deep Vulnerabilities Using Symbolic Execution

Deep program analysis without the headache

World War II Hackers
54 min

World War II Hackers

Stalin's best men, armed with paper and pen