Search for "LAC team" returned 725 results

58 min
How risky is the software you use?
CITL: Quantitative, Comparable Software Risk Reporting

113 min
Methodisch inkorrekt!
Die Wissenschaftsgala vom 33C3

58 min
When hardware must „just work“
An inside look at x86 CPU design

64 min
Source Code and Cross-Domain Authorship Attribution
The Role of Stylometry in Privacy

38 min
Hunting the Sigfox: Wireless IoT Network Security
Dissecting the radio protocol of Sigfox, the global…

60 min
Attacking end-to-end email encryption
Efail, other attacks and lessons learned.

56 min
Electronic Bank Robberies
Stealing Money from ATMs with Malware

46 min
SELECT code_execution FROM * USING SQLite;
--Gaining code execution using a malicious SQLite database

41 min
Infrastructure of a migratory bird
Technology and autonomy in more-than-human networks

51 min
Funky File Formats
Advanced binary tricks

41 min
SCADA StrangeLove 2
We already know

64 min
"Exploit" in theater
post-existentialism is the question, not post-privacy

42 min
Citzens or subjects? The battle to control our bodies, speech and communications
A call to action to defend our ePrivacy and eliminate…

53 min
Surveilling the surveillers
About military RF communication surveillance and other…

54 min