Search for "Nico" returned 1140 results

Thwarting Evil Maid Attacks
58 min

Thwarting Evil Maid Attacks

Physically Unclonable Functions for Hardware Tamper…

CAESAR and NORX
61 min

CAESAR and NORX

Developing the Future of Authenticated Encryption

Home Distilling
28 min

Home Distilling

Theory and practice of moonshining and legal distilling

Extracting keys from FPGAs, OTP Tokens and Door Locks
41 min

Extracting keys from FPGAs, OTP Tokens and Door Locks

Side-Channel (and other) Attacks in Practice

Rowhammer.js: Root privileges for web apps?
30 min

Rowhammer.js: Root privileges for web apps?

A tale of fault attacks on DRAM and attacks on CPU caches

Funky File Formats
51 min

Funky File Formats

Advanced binary tricks

Trustworthy secure modular operating system engineering
61 min

Trustworthy secure modular operating system engineering

fun(ctional) operating system and security protocol…

Through a PRISM, Darkly
63 min

Through a PRISM, Darkly

Everything we know about NSA spying

Triggering Deep Vulnerabilities Using Symbolic Execution
45 min

Triggering Deep Vulnerabilities Using Symbolic Execution

Deep program analysis without the headache