Search for "console" returned 167 results

SD-WAN a New Hop
49 min

SD-WAN a New Hop

How to hack software defined network and keep your sanity?

Boeing 737MAX: Automated Crashes
60 min

Boeing 737MAX: Automated Crashes

Underestimating the dangers of designing a protection system

Everything you want to know about x86 microcode, but might have been afraid to ask
57 min

Everything you want to know about x86 microcode, but might have been afraid to ask

An introduction into reverse-engineering x86 microcode and…

BREACH in Agda
49 min

BREACH in Agda

Security notions, proofs and attacks using dependently…

No PoC? No Fix! - A sad Story about Bluetooth Security
43 min

No PoC? No Fix! - A sad Story about Bluetooth Security

It is just a broken memcpy in the Bluetooth stack. Do we…

KOALitionsvertragsAnalyse
38 min

KOALitionsvertragsAnalyse

Mit Tools & Methoden dem Vertrag auf den Zahn fühlen

Dissecting HDMI
63 min

Dissecting HDMI

Developing open, FPGA-based capture hardware for conference…

Confessions of a future terrorist
58 min

Confessions of a future terrorist

A rough guide to over-regulating free speech with…

SigOver + alpha
55 min

SigOver + alpha

Signal overshadowing attack on LTE and its applications

Disclosure DOs, Disclosure DON'Ts
44 min

Disclosure DOs, Disclosure DON'Ts

Pragmatic Advice for Security Researchers

How (not) to build autonomous robots
54 min

How (not) to build autonomous robots

Fables from building a startup in Silicon Valley

Funky File Formats
51 min

Funky File Formats

Advanced binary tricks

Attacking Chrome IPC
54 min

Attacking Chrome IPC

Reliably finding bugs to escape the Chrome sandbox

The Clash of Digitalizations
31 min

The Clash of Digitalizations

The Devolution of Arab Men from Humans to Digital Fodder

Security of the IC Backside
59 min

Security of the IC Backside

The future of IC analysis

rad1o++
58 min

rad1o++

half a year later

Top X* usability obstacles
59 min

Top X* usability obstacles

*(will be specified later based on usability test with…

Kryptographie nach Snowden
57 min

Kryptographie nach Snowden

Was tun nach der mittelmäßigen Kryptographie-Apokalypse?