Search for "sECuRE"

Intel Management Engine deep dive
60 min

Intel Management Engine deep dive

Understanding the ME at the OS and hardware level

Infocalypse now: P0wning stuff is not enough
29 min

Infocalypse now: P0wning stuff is not enough

Several failure modes of the hacker scene

CloudABI
62 min

CloudABI

Pure capability-based security for UNIX

Glitching For n00bs
58 min

Glitching For n00bs

A Journey to Coax Out Chips' Inner Secrets

RFID Treehouse of Horror
58 min

RFID Treehouse of Horror

Hacking City-Wide Access Control Systems

Reproducible Builds
63 min

Reproducible Builds

Moving Beyond Single Points of Failure for Software…

Cyber all the Wassenaars
58 min

Cyber all the Wassenaars

Export controls and exploit regulations: braindead and…

SigOver + alpha
55 min

SigOver + alpha

Signal overshadowing attack on LTE and its applications

What Price the Upload Filter?
54 min

What Price the Upload Filter?

The history and costs of government exceptional access

The Gospel of IRMA
55 min

The Gospel of IRMA

Attribute Based Credentials in Practice

Understanding millions of gates
35 min

Understanding millions of gates

Introduction to IC reverse engineering for…