Search for "sECuRE" returned 735 results

58 min
Virtual Machine Introspection
From the Outside Looking In

58 min
Cyber all the Wassenaars
Export controls and exploit regulations: braindead and…

55 min
SigOver + alpha
Signal overshadowing attack on LTE and its applications

59 min
Let's build a quantum computer!
Understanding the architecture of a quantum processor

38 min
Turning Chromebooks into regular laptops
With the power of open source!

55 min
The Gospel of IRMA
Attribute Based Credentials in Practice

35 min
Understanding millions of gates
Introduction to IC reverse engineering for…

60 min
Opening Closed Systems with GlitchKit
'Liberating' Firmware from Closed Devices with Open Source…

39 min
Should e-voting experience of Estonia be copied?
Observer report of 2023 parliamentary elections

54 min
What Price the Upload Filter?
The history and costs of government exceptional access

21 min
Bootloader Crimes
Building disposable Windows VMs

59 min