Search for "Kemo" returned 602 results

63 min
Reproducible Builds
Moving Beyond Single Points of Failure for Software…

60 min
Intel Management Engine deep dive
Understanding the ME at the OS and hardware level

43 min
Sanitizing PCAPs
Fun and games until someone uses IPv6 or TCP

49 min
BREACH in Agda
Security notions, proofs and attacks using dependently…

32 min
library operating systems
reject the default reality^W abstractions and substitute…

64 min
On the Security and Privacy of Modern Single Sign-On in the Web
(Not Only) Attacks on OAuth and OpenID Connect

37 min
Listening Back Browser Add-On Tranlates Cookies Into Sound
The Sound of Surveillance

61 min
wallet.fail
Hacking the most popular cryptocurrency hardware wallets

62 min
Getting software right with properties, generated tests, and proofs
Evolve your hack into robust software!

50 min
Connected Mobility hacken: digital.bike.23
Von E-Bikes in der Connected Mobility zur Entstehung eines…

62 min
HUMUS sapiens
Open Soil Research

41 min