Search for "sECuRE" returned 715 results

56 min
Electronic Bank Robberies
Stealing Money from ATMs with Malware

58 min
Taming the Chaos: Can we build systems that actually work?
Possible paths from today's ghastly hackery to what…

60 min
Open Source is Insufficient to Solve Trust Problems in Hardware
How Betrusted Aims to Close the Hardware TOCTOU Gap

61 min
How Alice and Bob meet if they don't like onions
Survey of Network Anonymisation Techniques

43 min
Tractors, Rockets and the Internet in Belarus
How belarusian authoritarian regime is using technologies…

35 min
Wallet Security
How (not) to protect private keys

58 min
CIA vs. Wikileaks
Intimiditation surveillance and other tactics observed and…

57 min
Everything you want to know about x86 microcode, but might have been afraid to ask
An introduction into reverse-engineering x86 microcode and…

56 min
Iridium Update
more than just pagers

31 min
TrustZone is not enough
Hijacking debug components for embedded security

58 min