Search for "sECuRE" returned 715 results

51 min
Funky File Formats
Advanced binary tricks

56 min
Iridium Update
more than just pagers

32 min
Internet of Dongs
A long way to a vibrant future

25 min
»Hard Drive Punch«
Destroying data as a performative act

38 min
Hunting the Sigfox: Wireless IoT Network Security
Dissecting the radio protocol of Sigfox, the global…

22 min
Doping your Fitbit
On Fitbit Firmware Modifications and Data Extraction

63 min
A look into the Mobile Messaging Black Box
A gentle introduction to mobile messaging and subsequent…

49 min
Dissecting VoLTE
Exploiting Free Data Channels and Security Problems

30 min
In Search of Evidence-Based IT-Security
IT security is largely a science-free field. This needs to…

49 min
BREACH in Agda
Security notions, proofs and attacks using dependently…

58 min
Thwarting Evil Maid Attacks
Physically Unclonable Functions for Hardware Tamper…

60 min
Concepts for global TSCM
getting out of surveillance state mode

31 min
PUFs, protection, privacy, PRNGs
an overview of physically unclonable functions

58 min