Search for "Nico" returned 1140 results

45 min
Digitale Gewalt
Das Update

58 min
Thwarting Evil Maid Attacks
Physically Unclonable Functions for Hardware Tamper…

61 min
CAESAR and NORX
Developing the Future of Authenticated Encryption

28 min
Home Distilling
Theory and practice of moonshining and legal distilling

41 min
Extracting keys from FPGAs, OTP Tokens and Door Locks
Side-Channel (and other) Attacks in Practice

30 min
Rowhammer.js: Root privileges for web apps?
A tale of fault attacks on DRAM and attacks on CPU caches

51 min
Funky File Formats
Advanced binary tricks

60 min
APT Reports and OPSEC Evolution, or: These are not the APT reports you are looking for
How advanced threat actors learn and change with innovation…

61 min
Trustworthy secure modular operating system engineering
fun(ctional) operating system and security protocol…

63 min
Through a PRISM, Darkly
Everything we know about NSA spying

45 min