Search for "@FiLiS" returned 617 results

56 min
Viva la Vita Vida
Hacking the most secure handheld console

58 min
Baseband Exploitation in 2013
Hexagon challenges

63 min
Traue keinem Scan, den du nicht selbst gefälscht hast
"Bei Kopierern kommt das raus, was man reinsteckt." – Wer…

45 min
Triggering Deep Vulnerabilities Using Symbolic Execution
Deep program analysis without the headache

69 min
cryptocurrencies, smart contracts, etc.: revolutionary tech?
short answer: Yes!

61 min
How Alice and Bob meet if they don't like onions
Survey of Network Anonymisation Techniques

55 min
Inside Field Station Berlin Teufelsberg
The story of the NSA listening post – told by an ex-SIGINT…

47 min
Bug class genocide
Applying science to eliminate 100% of buffer overflows

63 min
goto fail;
exploring two decades of transport layer insecurity

59 min
De-anonymizing Programmers
Large Scale Authorship Attribution from Executable Binaries…

58 min
Script Your Car!
Using existing hardware platforms to integrate python into…

59 min
Free Electron Lasers
...or why we need 17 billion Volts to make a picture.

53 min
No Love for the US Gov.
Why Lauri Love’s case is even more important than you…

44 min
Replication Prohibited
3D printed key attacks

62 min
Bionic Ears
Introduction into State-of-the-Art Hearing Aid Technology

54 min