Search for "Jim" returned 5093 results

Code Pointer Integrity
61 min

Code Pointer Integrity

... or how we battle the daemons of memory safety

Reproducible Builds
63 min

Reproducible Builds

Moving Beyond Single Points of Failure for Software…

The Cloud Conspiracy 2008-2014
63 min

The Cloud Conspiracy 2008-2014

how the EU was hypnotised that the NSA did not exist

Check your privileges!
60 min

Check your privileges!

How to drop more of your privileges to reduce attack…

How hackers grind an MMORPG: by taking it apart!
54 min

How hackers grind an MMORPG: by taking it apart!

An introduction to reverse engineering network protocols

LatticeHacks
65 min

LatticeHacks

Fun with lattices in cryptography and cryptanalysis

Viva la Vita Vida
56 min

Viva la Vita Vida

Hacking the most secure handheld console

Corporate surveillance, digital tracking, big data & privacy
62 min

Corporate surveillance, digital tracking, big data & privacy

How thousands of companies are profiling, categorizing,…

How I Learned to Stop Reinventing and Love the Wheels
57 min

How I Learned to Stop Reinventing and Love the Wheels

or having FUN with (home/hackerspace) robotics

3D Casting Aluminum
55 min

3D Casting Aluminum

Too Much Fun with Microwaves

Crypto Wars Part II
60 min

Crypto Wars Part II

The Empires Strike Back

De-anonymizing Programmers
59 min

De-anonymizing Programmers

Large Scale Authorship Attribution from Executable Binaries…

Memsad
61 min

Memsad

why clearing memory is hard.

An Elevator to the Moon (and back)
61 min

An Elevator to the Moon (and back)

Space Transportation and the Extraterrestrial Imperative