Search for "mare" returned 5245 results

A Dozen Years of Shellphish
57 min

A Dozen Years of Shellphish

From DEFCON to the DARPA Cyber Grand Challenge

From Computation to Consciousness
60 min

From Computation to Consciousness

How computation helps to explain mind, universe and…

coreboot: Beyond The Final Frontier
50 min

coreboot: Beyond The Final Frontier

Open source BIOS replacement with a radical approach to…

Deploying TLS 1.3: the great, the good and the bad
61 min

Deploying TLS 1.3: the great, the good and the bad

Improving the encrypted the web, one round-trip at a time

institutions for Resolution Disputes
33 min

institutions for Resolution Disputes

Rosa Menkman investigates video compression, feedback, and…

In Search of Evidence-Based IT-Security
30 min

In Search of Evidence-Based IT-Security

IT security is largely a science-free field. This needs to…

What Ever Happened to Nuclear Weapons?
61 min

What Ever Happened to Nuclear Weapons?

Politics and Physics of a Problem That's Not Going Away

Stealth malware - can good guys win?
78 min

Stealth malware - can good guys win?

Challenges in detecting system compromises and why we’re so…

The DROWN Attack
55 min

The DROWN Attack

Breaking TLS using SSLv2

PHP Extension Development with C++
44 min

PHP Extension Development with C++

Wrapping a C preprocessor API in C++