Search for "Max" returned 4702 results
55 min
What could possibly go wrong with <insert x86 instruction here>?
Side effects include side-channel attacks and bypassing…
64 min
It Always Feels Like the Five Eyes Are Watching You
Five Eyes’ Quest For Security Has Given Us Widespread…
30 min
In Search of Evidence-Based IT-Security
IT security is largely a science-free field. This needs to…
39 min
The Unfolding Space Glove
A Wearable for the Visually Impaired Translating 3D Vision…
40 min
Never Forgetti
a didactic live-gaming performance about dying women across…
37 min
The foodsaving grassroots movement
How cooperative online structures can facilitate…
59 min
De-anonymizing Programmers
Large Scale Authorship Attribution from Executable Binaries…
60 min
Breaking Baryons
On the Awesomeness of Particle Accelerators and Colliders
35 min
Harry Potter and the Not-So-Smart Proxy War
Taking a look at a covert CIA virtual fencing solution
57 min
TrustZone-M(eh): Breaking ARMv8-M's security
Hardware attacks on the latest generation of ARM Cortex-M…
58 min
Open Source Estrogen
From molecular colonization to molecular collaboration
51 min
Funky File Formats
Advanced binary tricks
53 min
The Ultimate Amiga 500 Talk
Amiga Hardware Design And Programming
61 min
Untrusting the CPU
A proposal for secure computing in an age where we cannot…
64 min
3 Years After Snowden: Is Germany fighting State Surveillance?
A Closer Look at the Political Reactions to Mass…
32 min
Think big or care for yourself
On the obstacles to think of emergent technologies in the…
43 min