Search for "Os Keyes" returned 637 results

Craft, leisure, and end-user innovation
32 min

Craft, leisure, and end-user innovation

How hacking is conceived in social science research

Protecting Your Privacy at the Border
58 min

Protecting Your Privacy at the Border

Traveling with Digital Devices in the Golden Age of…

Ten years after ‚We Lost The War‘
61 min

Ten years after ‚We Lost The War‘

The future does not look much brighter than ten years ago.…

Thwarting Evil Maid Attacks
58 min

Thwarting Evil Maid Attacks

Physically Unclonable Functions for Hardware Tamper…

An ultrashort history of ultrafast imaging
60 min

An ultrashort history of ultrafast imaging

Featuring the shortest movies and the largest lasers

BREACH in Agda
49 min

BREACH in Agda

Security notions, proofs and attacks using dependently…

CIA vs. Wikileaks
58 min

CIA vs. Wikileaks

Intimiditation surveillance and other tactics observed and…

Afroroutes: Africa Elsewhere
38 min

Afroroutes: Africa Elsewhere

VR experience "Beyond Slavery"

35C3 Infrastructure Review
65 min

35C3 Infrastructure Review

Up and to the right: All the statistics about this event…

Revisiting SSL/TLS Implementations
55 min

Revisiting SSL/TLS Implementations

New Bleichenbacher Side Channels and Attacks

What does Big Brother see, while he is watching?
60 min

What does Big Brother see, while he is watching?

Uncovering images from the secret Stasi archives.

Exploiting PHP7 unserialize
44 min

Exploiting PHP7 unserialize

teaching a new dog old tricks

goto fail;
63 min

goto fail;

exploring two decades of transport layer insecurity

Hardening hardware and choosing a #goodBIOS
47 min

Hardening hardware and choosing a #goodBIOS

Clean boot every boot - rejecting persistence of malicious…