Search for "the ultimate" returned 99 results

The rise and fall of Internet voting in Norway
60 min

The rise and fall of Internet voting in Norway

Evaluating a complex cryptographic implementation

Verified Firewall Ruleset Verification
32 min

Verified Firewall Ruleset Verification

Math, Functional Programming, Theorem Proving, and an…

library operating systems
32 min

library operating systems

reject the default reality^W abstractions and substitute…

Union Busting
42 min

Union Busting

What is it and why you should care

HAL - The Open-Source Hardware Analyzer
60 min

HAL - The Open-Source Hardware Analyzer

A dive into the foundations of hardware reverse engineering…

Tell no-one
62 min

Tell no-one

A century of secret deals between the NSA and the telecom…

It Always Feels Like the Five Eyes Are Watching You
64 min

It Always Feels Like the Five Eyes Are Watching You

Five Eyes’ Quest For Security Has Given Us Widespread…

Programming FPGAs with PSHDL
61 min

Programming FPGAs with PSHDL

Let's create the Arduino for FPGAs

Thwarting Evil Maid Attacks
58 min

Thwarting Evil Maid Attacks

Physically Unclonable Functions for Hardware Tamper…

Million Dollar Dissidents and the Rest of Us
53 min

Million Dollar Dissidents and the Rest of Us

Uncovering Nation-State Mobile Espionage in the Wild

Beyond Anti Evil Maid
60 min

Beyond Anti Evil Maid

Making it easier to avoid low-level compromise, and why…

Kernel Tracing With eBPF
54 min

Kernel Tracing With eBPF

Unlocking God Mode on Linux

Sneaking In Network Security
60 min

Sneaking In Network Security

Enforcing strong network segmentation, without anyone…