Search for "Nico" returned 1195 results
56 min
Viva la Vita Vida
Hacking the most secure handheld console
59 min
Memory Deduplication: The Curse that Keeps on Giving
A tale of 3 different memory deduplication based…
58 min
Baseband Exploitation in 2013
Hexagon challenges
60 min
Lets break modern binary code obfuscation
A semantics based approach
60 min
The rise and fall of Internet voting in Norway
Evaluating a complex cryptographic implementation
64 min
"Exploit" in theater
post-existentialism is the question, not post-privacy
35 min
Wallet Security
How (not) to protect private keys
31 min
The woman behind your WiFi
Hedy Lamarr: Frequency Hopping in Hollywood
36 min
Modchips of the State
Hardware implants in the supply-chain
45 min
To Protect And Infect
The militarization of the Internet
55 min
How to Build a Mind
Artificial Intelligence Reloaded
32 min
Think big or care for yourself
On the obstacles to think of emergent technologies in the…
26 min