Search for "fake" returned 2758 results
57 min
A Dozen Years of Shellphish
From DEFCON to the DARPA Cyber Grand Challenge
62 min
SymbiFlow - Finally the GCC of FPGAs!
A fully FOSS, Verilog to bitstream, timing driven, cross…
59 min
Say hi to your new boss: How algorithms might soon control our lives.
Discrimination and ethics in the data-driven society
56 min
Electronic Bank Robberies
Stealing Money from ATMs with Malware
59 min
We should share our secrets
Shamir secret sharing: How it works and how to implement it
40 min
What is this? A machine learning model for ants?
How to shrink deep learning models, and why you would want…
60 min
HAL - The Open-Source Hardware Analyzer
A dive into the foundations of hardware reverse engineering…
61 min
CAESAR and NORX
Developing the Future of Authenticated Encryption
60 min
Everything you always wanted to know about Certificate Transparency
(but were afraid to ask)
57 min
The Precariat: A Disruptive Class for Disruptive Times.
Why and How the Precariat will define the Global…
42 min
Citzens or subjects? The battle to control our bodies, speech and communications
A call to action to defend our ePrivacy and eliminate…
45 min
A geometry engine from first principles
the first three years of a six month project.
47 min
Android DDI
Dynamic Dalvik Instrumentation of Android Applications and…
60 min
Adventures in Reverse Engineering Broadcom NIC Firmware
Unlocking a system with 100% open source firmware
55 min