Search for "Evan Roth" returned 982 results
61 min
Damn Vulnerable Chemical Process
Exploitation in a new media
64 min
"Exploit" in theater
post-existentialism is the question, not post-privacy
44 min
Exploiting PHP7 unserialize
teaching a new dog old tricks
61 min
Computational Meta-Psychology
An Artificial Intelligence exploration into the creation of…
62 min
Public Library/Memory of the World
Access to knowledge for every member of society
62 min
Tell no-one
A century of secret deals between the NSA and the telecom…
35 min
Low Cost Non-Invasive Biomedical Imaging
An Open Electrical Impedance Tomography Project
59 min
Security of the IC Backside
The future of IC analysis
59 min
De-anonymizing Programmers
Large Scale Authorship Attribution from Executable Binaries…
56 min
Planes and Ships and Saving Lives
How soft and hardware can play a key role in saving lives…
60 min
Desperately Seeking Susy
A farewell to a bold proposal?
60 min
Windows drivers attack surface
some 'new' insights
60 min
Everything you always wanted to know about Certificate Transparency
(but were afraid to ask)
60 min
From Computation to Consciousness
How computation helps to explain mind, universe and…
54 min
AMD x86 SMU firmware analysis
Do you care about Matroshka processors?
60 min
My Robot Will Crush You With Its Soft Delicate Hands!
How to design and fabricate soft robots using everyday…
31 min
Living Drones
From war pigeons in 1914 to cyborg moths in 2014
42 min
Firmware Fat Camp
Embedded Security Using Binary Autotomy
51 min