Search for "sECuRE" returned 715 results

The Perl Jam 2
60 min

The Perl Jam 2

The Camel Strikes Back

Vehicle immobilization revisited
55 min

Vehicle immobilization revisited

Uncovering and assessing a second authentication mechanism…

Uncaging Microchips
61 min

Uncaging Microchips

Techniques for Chip Preparation

How to Break PDFs
58 min

How to Break PDFs

Breaking PDF Encryption and PDF Signatures

Leaving legacy behind
52 min

Leaving legacy behind

Reducing carbon footprint of network services with MirageOS…

TamaGo - bare metal Go framework for ARM SoCs.
59 min

TamaGo - bare metal Go framework for ARM SoCs.

Reducing the attack surface with pure embedded Go.

BLUFFS: Bluetooth Forward and Future Secrecy Attacks and Defenses
59 min

BLUFFS: Bluetooth Forward and Future Secrecy Attacks and Defenses

Breaking and fixing the Bluetooth standard. One More Time.

Shopshifting
60 min

Shopshifting

The potential for payment system abuse

Kernel Tracing With eBPF
54 min

Kernel Tracing With eBPF

Unlocking God Mode on Linux

Internet of Fails
59 min

Internet of Fails

Where IoT has gone wrong

wallet.fail
61 min

wallet.fail

Hacking the most popular cryptocurrency hardware wallets

WarGames in memory
56 min

WarGames in memory

what is the winning move?

Self-encrypting deception
58 min

Self-encrypting deception

weaknesses in the encryption of solid state drives (SSDs)

Memsad
61 min

Memsad

why clearing memory is hard.