Search for "cbass" returned 400 results
58 min
When hardware must „just work“
An inside look at x86 CPU design
60 min
On the insecure nature of turbine control systems in power generation
A security study of turbine control systems in power…
64 min
Source Code and Cross-Domain Authorship Attribution
The Role of Stylometry in Privacy
42 min
Domain Name System
Hierarchical decentralized naming system used since 30 years
38 min
What your phone won’t tell you
Uncovering fake base stations on iOS devices
37 min
Music on Mars?
A Musical Adventure for Astronauts and the Space Cadets Who…
31 min
Sysadmins of the world, unite!
a call to resistance
31 min
Make the Internet Neutral Again
Let's put the new EU Net Neutrality rules to work
58 min
Taming the Chaos: Can we build systems that actually work?
Possible paths from today's ghastly hackery to what…
29 min
Infocalypse now: P0wning stuff is not enough
Several failure modes of the hacker scene
42 min