Search for "Os Keyes" returned 598 results

61 min
How Alice and Bob meet if they don't like onions
Survey of Network Anonymisation Techniques

47 min
Hardening hardware and choosing a #goodBIOS
Clean boot every boot - rejecting persistence of malicious…

55 min
YOU’VE JUST BEEN FUCKED BY PSYOPS
UFOS, MAGIC, MIND CONTROL, ELECTRONIC WARFARE, AI, AND THE…

45 min
Tech(no)fixes beware!
Spotting (digital) tech fictions as replacement for social…

55 min
The Gospel of IRMA
Attribute Based Credentials in Practice

49 min
Dissecting VoLTE
Exploiting Free Data Channels and Security Problems

42 min
Reverse engineering FPGAs
Dissecting FPGAs from bottom up, extracting schematics and…

59 min
Memory Deduplication: The Curse that Keeps on Giving
A tale of 3 different memory deduplication based…

59 min
Free Electron Lasers
...or why we need 17 billion Volts to make a picture.

60 min
Why is GPG "damn near unusable"?
An overview of usable security research

49 min
Creating Resilient and Sustainable Mobile Phones
Be prepared for the coming Digital Winter. And play…

32 min
Finding the Weak Crypto Needle in a Byte Haystack
Automatic detection of key-reuse vulnerabilities

53 min
Deep Learning Blindspots
Tools for Fooling the "Black Box"

61 min
Code Pointer Integrity
... or how we battle the daemons of memory safety

28 min
Long war tactics
or how we learned to stop worrying and love the NSA

69 min