Search for "various" returned 865 results

60 min
Lets break modern binary code obfuscation
A semantics based approach

60 min
The rise and fall of Internet voting in Norway
Evaluating a complex cryptographic implementation

55 min
Revisiting SSL/TLS Implementations
New Bleichenbacher Side Channels and Attacks

60 min
Why is GPG "damn near unusable"?
An overview of usable security research

60 min
Beyond Anti Evil Maid
Making it easier to avoid low-level compromise, and why…

60 min
On the insecure nature of turbine control systems in power generation
A security study of turbine control systems in power…

32 min
History and implications of DRM
From tractors to Web standards

30 min
Forging the USB armory
Creating an open source secure flash-drive-sized computer

51 min
Funky File Formats
Advanced binary tricks

60 min
Boeing 737MAX: Automated Crashes
Underestimating the dangers of designing a protection system

37 min
The foodsaving grassroots movement
How cooperative online structures can facilitate…

40 min
Intercoms Hacking
Call the frontdoor to install your backdoors

63 min
Reconstructing narratives
transparency in the service of justice

40 min
The Extremely Large Telescope (ELT)
Building the biggest optical telescope on earth

38 min