Search for "Nina" returned 474 results

Triggering Deep Vulnerabilities Using Symbolic Execution
45 min

Triggering Deep Vulnerabilities Using Symbolic Execution

Deep program analysis without the headache

HAL - The Open-Source Hardware Analyzer
60 min

HAL - The Open-Source Hardware Analyzer

A dive into the foundations of hardware reverse engineering…

Wireless Drivers: Freedom considered harmful?
51 min

Wireless Drivers: Freedom considered harmful?

An OpenWrt perspective on the development of Linux 802.11…

"Exploit" in theater
64 min

"Exploit" in theater

post-existentialism is the question, not post-privacy

Drones
60 min

Drones

Autonomous flying vehicles, where are we and where are we…

3D Casting Aluminum
55 min

3D Casting Aluminum

Too Much Fun with Microwaves

Sneaking In Network Security
60 min

Sneaking In Network Security

Enforcing strong network segmentation, without anyone…

The Internet in Cuba: A Story of Community Resilience
58 min

The Internet in Cuba: A Story of Community Resilience

Get a unique tour of some of the world’s most unusual…

Untrusting the CPU
61 min

Untrusting the CPU

A proposal for secure computing in an age where we cannot…

Telescope Making
69 min

Telescope Making

How to make your own telescope

10 Jahre OpenStreetMap
54 min

10 Jahre OpenStreetMap

Wir leben noch und zwar sehr gut.

SELECT code_execution FROM * USING SQLite;
46 min

SELECT code_execution FROM * USING SQLite;

--Gaining code execution using a malicious SQLite database

Corporate surveillance, digital tracking, big data & privacy
62 min

Corporate surveillance, digital tracking, big data & privacy

How thousands of companies are profiling, categorizing,…

The Magic World of Searchable Symmetric Encryption
58 min

The Magic World of Searchable Symmetric Encryption

A brief introduction to search over encrypted data