Search for "428" returned 2020 results

Replication Prohibited
44 min

Replication Prohibited

3D printed key attacks

10 Years of Fun with Embedded Devices
48 min

10 Years of Fun with Embedded Devices

How OpenWrt evolved from a WRT54G firmware to an universal…

HAL - The Open-Source Hardware Analyzer
60 min

HAL - The Open-Source Hardware Analyzer

A dive into the foundations of hardware reverse engineering…

Kernel Tracing With eBPF
54 min

Kernel Tracing With eBPF

Unlocking God Mode on Linux

Crypto Wars Part II
60 min

Crypto Wars Part II

The Empires Strike Back

Let's Encrypt
62 min

Let's Encrypt

A Free Robotic Certificate Authority

CAESAR and NORX
61 min

CAESAR and NORX

Developing the Future of Authenticated Encryption

Quantum Computing: Are we there yet?
61 min

Quantum Computing: Are we there yet?

An introduction to quantum computing and a review of the…

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

How (not) to build autonomous robots
54 min

How (not) to build autonomous robots

Fables from building a startup in Silicon Valley

The Tor Network
62 min

The Tor Network

We're living in interesting times