Search for "sECuRE" returned 800 results

ZombieLoad Attack
55 min

ZombieLoad Attack

Leaking Your Recent Memory Operations on Intel CPUs

Attacking end-to-end email encryption
60 min

Attacking end-to-end email encryption

Efail, other attacks and lessons learned.

Cosmic Connectivity
46 min

Cosmic Connectivity

Starlink, Satellite Swarms, and the Hackers' Final Frontier

Build a Fake Phone, Find Real Bugs
41 min

Build a Fake Phone, Find Real Bugs

Qualcomm GPU Emulation and Fuzzing with LibAFL QEMU

Technopolice: calling out so-called "Safe Cities"
39 min

Technopolice: calling out so-called "Safe Cities"

Decentralising the fight against automated surveillance in…

Tales from Hardware Security Research
45 min

Tales from Hardware Security Research

From Research over Vulnerability Discovery to Public…

The seizure of the Iuventa
32 min

The seizure of the Iuventa

How search and rescue in the mediterranean was criminalized

Planes and Ships and Saving Lives
56 min

Planes and Ships and Saving Lives

How soft and hardware can play a key role in saving lives…

re:claimID
34 min

re:claimID

A GNUnet Application for Self-sovereign, Decentralised…