Search for "Luca" returned 338 results

48 min
Don't Ruck Us Too Hard - Owning Ruckus AP Devices
3 different RCE vulnerabilities on Ruckus Wireless access…

46 min
Taking a scalpel to QNX
Analyzing & Breaking Exploit Mitigations and Secure Random…

65 min
The exhaust emissions scandal („Dieselgate“)
Take a deep breath into pollution trickery

58 min
The Internet in Cuba: A Story of Community Resilience
Get a unique tour of some of the world’s most unusual…

58 min
Virtual Machine Introspection
From the Outside Looking In

65 min
35C3 Infrastructure Review
Up and to the right: All the statistics about this event…

56 min
The mummy unwrapped
Cultural Commons durch Kunstraub

62 min
Bionic Ears
Introduction into State-of-the-Art Hearing Aid Technology

46 min
SELECT code_execution FROM * USING SQLite;
--Gaining code execution using a malicious SQLite database

58 min
Baseband Exploitation in 2013
Hexagon challenges

58 min
When hardware must „just work“
An inside look at x86 CPU design

60 min
Beyond Anti Evil Maid
Making it easier to avoid low-level compromise, and why…

42 min
Wifibroadcast
How to convert standard wifi dongles into digital broadcast…

42 min
Reverse engineering FPGAs
Dissecting FPGAs from bottom up, extracting schematics and…

58 min
Cyber all the Wassenaars
Export controls and exploit regulations: braindead and…

61 min