Search for "Steff" returned 1096 results

33 min
Gone in 60 Milliseconds
Intrusion and Exfiltration in Server-less Architectures

31 min
Demystifying Network Cards
Things you always wanted to know about NIC drivers

63 min
The Cloud Conspiracy 2008-2014
how the EU was hypnotised that the NSA did not exist

63 min
A look into the Mobile Messaging Black Box
A gentle introduction to mobile messaging and subsequent…

59 min
Security of the IC Backside
The future of IC analysis

54 min
Kernel Tracing With eBPF
Unlocking God Mode on Linux

30 min
The Machine To Be Another
Exploring identity and empathy through neuroscience,…

40 min
Infrastructures in a horizontal farmers community
Human agreements, comunication infrastructures, services in…

60 min
Windows drivers attack surface
some 'new' insights

62 min
Space Hacker
Uploading rover...

59 min
Fernvale: An Open Hardware and Software Platform, Based on the (nominally) Closed-Source…
A Lawful Method for Converting Closed IP into Open IP

60 min
Beyond your cable modem
How not to do DOCSIS networks

40 min