Events for tag "Security & Hacking"
How did GCHQ do it to the Guardian's copy of Snowden's…
A Journey to Coax Out Chips' Inner Secrets
How to freely share research without being arrested
You have a tracking device in your pocket
A Certificate Authority To Encrypt the Entire Web
A Deep Technical Analysis
Gefahren von Kameras für (biometrische)…
Reverse Engineering Dead Protocols
How to retrieve secret keys without going bankrupt
Piecing together the missing bits
Techniques for Chip Preparation
Chasing GRX and SS7 vulns
Internet reengineering session
From the Outside Looking In
Moving Beyond Single Points of Failure for Software…
Industrial System Ownership
Und nichts (Secure) Bootet mehr?
Stop being tracked online
Targeted threats to civil society
Automatic detection of key-reuse vulnerabilities
New Bleichenbacher Side Channels and Attacks
The untold story of what really happened, how it was…
Is Your Document Telling on You?
How Man-in-the-Middle filtering solutions harm the security…
A gentle introduction to elliptic-curve cryptography
What went wrong, how the Internet reacted, what we can…
... or how we battle the daemons of memory safety
Do you care about Matroshka processors?
Get a verifiable path from source to binary