Search for "sECuRE" returned 715 results

Funky File Formats
51 min

Funky File Formats

Advanced binary tricks

Iridium Update
56 min

Iridium Update

more than just pagers

Internet of Dongs
32 min

Internet of Dongs

A long way to a vibrant future

»Hard Drive Punch«
25 min

»Hard Drive Punch«

Destroying data as a performative act

Hunting the Sigfox: Wireless IoT Network Security
38 min

Hunting the Sigfox: Wireless IoT Network Security

Dissecting the radio protocol of Sigfox, the global…

Doping your Fitbit
22 min

Doping your Fitbit

On Fitbit Firmware Modifications and Data Extraction

A look into the Mobile Messaging Black Box
63 min

A look into the Mobile Messaging Black Box

A gentle introduction to mobile messaging and subsequent…

Dissecting VoLTE
49 min

Dissecting VoLTE

Exploiting Free Data Channels and Security Problems

In Search of Evidence-Based IT-Security
30 min

In Search of Evidence-Based IT-Security

IT security is largely a science-free field. This needs to…

BREACH in Agda
49 min

BREACH in Agda

Security notions, proofs and attacks using dependently…

Thwarting Evil Maid Attacks
58 min

Thwarting Evil Maid Attacks

Physically Unclonable Functions for Hardware Tamper…

Concepts for global TSCM
60 min

Concepts for global TSCM

getting out of surveillance state mode

PUFs, protection, privacy, PRNGs
31 min

PUFs, protection, privacy, PRNGs

an overview of physically unclonable functions

Operation Triangulation
58 min

Operation Triangulation

What You Get When Attack iPhones of Researchers