Search for "Rob Miles" returned 384 results
32 min
Finding the Weak Crypto Needle in a Byte Haystack
Automatic detection of key-reuse vulnerabilities
60 min
Intel Management Engine deep dive
Understanding the ME at the OS and hardware level
48 min
Don't Ruck Us Too Hard - Owning Ruckus AP Devices
3 different RCE vulnerabilities on Ruckus Wireless access…
43 min
unexpected coffee
a dive into industrial coffee machines
40 min
Der netzpolitische Jahresrückblick
War alles schon mal besser
54 min
What Price the Upload Filter?
The history and costs of government exceptional access
60 min
Open Source is Insufficient to Solve Trust Problems in Hardware
How Betrusted Aims to Close the Hardware TOCTOU Gap
47 min
All cops are broadcasting
Obtaining the secret TETRA primitives after decades in the…
55 min
3D Casting Aluminum
Too Much Fun with Microwaves
60 min
On the insecure nature of turbine control systems in power generation
A security study of turbine control systems in power…
58 min
07KINGSTON25 JAMAICA: MALARIA UPDATE Dispatches from Fort Meade
Reporting on the secret trial of Chelsea Manning
41 min
Breathing Life into Legacy: An Open-Source Emulator of Legacy Apple Devices
A Dive into Reverse Engineering and Understanding the iPod…
59 min