Search for "Luca" returned 355 results

To Protect And Infect
45 min

To Protect And Infect

The militarization of the Internet

Vacuum robot security and privacy
61 min

Vacuum robot security and privacy

prevent your robot from sucking your data

Console Hacking
72 min

Console Hacking

Breaking the 3DS

SELECT code_execution FROM * USING SQLite;
46 min

SELECT code_execution FROM * USING SQLite;

--Gaining code execution using a malicious SQLite database

The mummy unwrapped
56 min

The mummy unwrapped

Cultural Commons durch Kunstraub

When hardware must „just work“
58 min

When hardware must „just work“

An inside look at x86 CPU design

Beyond Anti Evil Maid
60 min

Beyond Anti Evil Maid

Making it easier to avoid low-level compromise, and why…

Baseband Exploitation in 2013
58 min

Baseband Exploitation in 2013

Hexagon challenges

35C3 Infrastructure Review
65 min

35C3 Infrastructure Review

Up and to the right: All the statistics about this event…

Bionic Ears
62 min

Bionic Ears

Introduction into State-of-the-Art Hearing Aid Technology

Taking a scalpel to QNX
46 min

Taking a scalpel to QNX

Analyzing & Breaking Exploit Mitigations and Secure Random…

Deep Learning Blindspots
53 min

Deep Learning Blindspots

Tools for Fooling the "Black Box"

Überwachen und Sprache
58 min

Überwachen und Sprache

How to do things with words

The Fight for Encryption in 2016
60 min

The Fight for Encryption in 2016

Crypto fight in the Wake of Apple v. FBI

De-anonymizing Programmers
59 min

De-anonymizing Programmers

Large Scale Authorship Attribution from Executable Binaries…

Hacking (with) a TPM
37 min

Hacking (with) a TPM

Don't ask what you can do for TPMs, Ask what TPMs can do…

Kernel Tracing With eBPF
54 min

Kernel Tracing With eBPF

Unlocking God Mode on Linux