Search for "Seth Hardy" returned 899 results
56 min
WarGames in memory
what is the winning move?
31 min
DPRK Consumer Technology
Facts to fight lore
58 min
Self-encrypting deception
weaknesses in the encryption of solid state drives (SSDs)
21 min
Designing PCBs with code
Is designing circuits with code instead of CAD the future…
43 min
WTF DJI, UAV CTF?!
A hacker's view at commercial drone security
42 min
Firmware Fat Camp
Embedded Security Using Binary Autotomy
46 min
Practical Mix Network Design
Strong metadata protection for asynchronous messaging
57 min
The Layman's Guide to Zero-Day Engineering
A demystification of the exploit development lifecycle
33 min
Computer Science in the DPRK
A view into technology on the other side of the world
41 min
Our Time in a Product Review Cabal
And the malware and backdoors that came with it.
31 min
Unleash your smart-home devices: Vacuum Cleaning Robot Hacking
Why is my vacuum as powerful as my smartphone?
61 min
Code Pointer Integrity
... or how we battle the daemons of memory safety
20 min
The Nibbletronic
A DIY MIDI Controller and a New UI for Wind Instruments
63 min
All cops are broadcasting
TETRA unlocked after decades in the shadows
40 min