Search for "Math"

SELECT code_execution FROM * USING SQLite;
46 min

SELECT code_execution FROM * USING SQLite;

--Gaining code execution using a malicious SQLite database

What is this? A machine learning model for ants?
40 min

What is this? A machine learning model for ants?

How to shrink deep learning models, and why you would want…

Crypto Wars Part II
60 min

Crypto Wars Part II

The Empires Strike Back

Deploying TLS 1.3: the great, the good and the bad
61 min

Deploying TLS 1.3: the great, the good and the bad

Improving the encrypted the web, one round-trip at a time

ECCHacks
55 min

ECCHacks

A gentle introduction to elliptic-curve cryptography

Science for future?
63 min

Science for future?

What we can and need to change to keep climate change low -…

TrustZone-M(eh): Breaking ARMv8-M's security
57 min

TrustZone-M(eh): Breaking ARMv8-M's security

Hardware attacks on the latest generation of ARM Cortex-M…

A la recherche de l'information perdue
54 min

A la recherche de l'information perdue

some technofeminist reflections on Wikileaks

SigOver + alpha
55 min

SigOver + alpha

Signal overshadowing attack on LTE and its applications

Deep Learning Blindspots
53 min

Deep Learning Blindspots

Tools for Fooling the "Black Box"

Understanding millions of gates
35 min

Understanding millions of gates

Introduction to IC reverse engineering for…

Adventures in Reverse Engineering Broadcom NIC Firmware
60 min

Adventures in Reverse Engineering Broadcom NIC Firmware

Unlocking a system with 100% open source firmware

Hacker Jeopardy
95 min

Hacker Jeopardy

Zahlenraten für Geeks