Search for "535" returned 2045 results

When hardware must „just work“
58 min

When hardware must „just work“

An inside look at x86 CPU design

Beyond Anti Evil Maid
60 min

Beyond Anti Evil Maid

Making it easier to avoid low-level compromise, and why…

The Magic World of Searchable Symmetric Encryption
58 min

The Magic World of Searchable Symmetric Encryption

A brief introduction to search over encrypted data

To Protect And Infect, Part 2
62 min

To Protect And Infect, Part 2

The militarization of the Internet

Concepts for global TSCM
60 min

Concepts for global TSCM

getting out of surveillance state mode

Console Hacking 2016
53 min

Console Hacking 2016

PS4: PC Master Race

Corporate surveillance, digital tracking, big data & privacy
62 min

Corporate surveillance, digital tracking, big data & privacy

How thousands of companies are profiling, categorizing,…

TrustZone-M(eh): Breaking ARMv8-M's security
57 min

TrustZone-M(eh): Breaking ARMv8-M's security

Hardware attacks on the latest generation of ARM Cortex-M…

The Layman's Guide to Zero-Day Engineering
57 min

The Layman's Guide to Zero-Day Engineering

A demystification of the exploit development lifecycle

Space Ops 101
62 min

Space Ops 101

An introduction to Spacecraft Operations

Demystifying Network Cards
31 min

Demystifying Network Cards

Things you always wanted to know about NIC drivers

The eXperimental Robot Project
50 min

The eXperimental Robot Project

An open-hardware bipedal walking machine

Software Defined Emissions
60 min

Software Defined Emissions

A hacker’s review of Dieselgate

Toniebox Reverse Engineering
60 min

Toniebox Reverse Engineering

Eine Musikbox für Kinder, Maker und Hacker

Uncaging Microchips
61 min

Uncaging Microchips

Techniques for Chip Preparation