Search for "Hugo" returned 747 results

Understanding millions of gates
35 min

Understanding millions of gates

Introduction to IC reverse engineering for…

Italy's surveillance toolbox
27 min

Italy's surveillance toolbox

Research on Monitoring Italian Government Surveillance…

Growing Up Software Development
31 min

Growing Up Software Development

From Hacker Culture to the Software of the Future

The Perl Jam 2
60 min

The Perl Jam 2

The Camel Strikes Back

Beyond your cable modem
60 min

Beyond your cable modem

How not to do DOCSIS networks

Hacking the Nintendo Game & Watch
42 min

Hacking the Nintendo Game & Watch

Your princess is AES encrypted in another castle

Attacking end-to-end email encryption
60 min

Attacking end-to-end email encryption

Efail, other attacks and lessons learned.

Electromagnetic Threats for Information Security
49 min

Electromagnetic Threats for Information Security

Ways to Chaos in Digital and Analogue Electronics

Opening Closed Systems with GlitchKit
60 min

Opening Closed Systems with GlitchKit

'Liberating' Firmware from Closed Devices with Open Source…

Thwarting Evil Maid Attacks
58 min

Thwarting Evil Maid Attacks

Physically Unclonable Functions for Hardware Tamper…

Home Distilling
28 min

Home Distilling

Theory and practice of moonshining and legal distilling

Harry Potter and the Not-So-Smart Proxy War
35 min

Harry Potter and the Not-So-Smart Proxy War

Taking a look at a covert CIA virtual fencing solution

Jailbreaking iOS
47 min

Jailbreaking iOS

From past to present

SCADA - Gateway to (s)hell
45 min

SCADA - Gateway to (s)hell

Hacking industrial control gateways

Deploying TLS 1.3: the great, the good and the bad
61 min

Deploying TLS 1.3: the great, the good and the bad

Improving the encrypted the web, one round-trip at a time