Search for ".dol" returned 2575 results

An introduction to Firmware Analysis
40 min

An introduction to Firmware Analysis

Techniques - Tools - Tricks

WTFrance
31 min

WTFrance

Decrypting French encryption law

TrustZone-M(eh): Breaking ARMv8-M's security
57 min

TrustZone-M(eh): Breaking ARMv8-M's security

Hardware attacks on the latest generation of ARM Cortex-M…

Toward a Cognitive "Quantified Self"
49 min

Toward a Cognitive "Quantified Self"

Activity Recognition for the Mind

Open-BCI DIY-Neuroscience Maker-Art Mind-Hacking
38 min

Open-BCI DIY-Neuroscience Maker-Art Mind-Hacking

open source DIY brain-computer-interfaces | technology and…

In Search of Evidence-Based IT-Security
30 min

In Search of Evidence-Based IT-Security

IT security is largely a science-free field. This needs to…

Automatically Subtitling the C3
30 min

Automatically Subtitling the C3

How speech processing helps the CCC subtitle project, and…

Shut Up and Take My Money!
30 min

Shut Up and Take My Money!

The Red Pill of N26 Security

When hardware must „just work“
58 min

When hardware must „just work“

An inside look at x86 CPU design

Trackography
31 min

Trackography

You never read alone

library operating systems
32 min

library operating systems

reject the default reality^W abstractions and substitute…

goto fail;
63 min

goto fail;

exploring two decades of transport layer insecurity

Policing the Romantic Crowd
38 min

Policing the Romantic Crowd

Velocipedes and Face Recognition