Search for "Rob Miles" returned 384 results

32 min
Finding the Weak Crypto Needle in a Byte Haystack
Automatic detection of key-reuse vulnerabilities

60 min
Intel Management Engine deep dive
Understanding the ME at the OS and hardware level

41 min
Conquering Large Numbers at the LHC
From 1 000 000 000 000 000 to 10: Breaking down 14 Orders…

48 min
Don't Ruck Us Too Hard - Owning Ruckus AP Devices
3 different RCE vulnerabilities on Ruckus Wireless access…

47 min
All cops are broadcasting
Obtaining the secret TETRA primitives after decades in the…

60 min
Open Source is Insufficient to Solve Trust Problems in Hardware
How Betrusted Aims to Close the Hardware TOCTOU Gap

58 min
07KINGSTON25 JAMAICA: MALARIA UPDATE Dispatches from Fort Meade
Reporting on the secret trial of Chelsea Manning

40 min
Der netzpolitische Jahresrückblick
War alles schon mal besser

54 min
What Price the Upload Filter?
The history and costs of government exceptional access

60 min
On the insecure nature of turbine control systems in power generation
A security study of turbine control systems in power…

55 min
3D Casting Aluminum
Too Much Fun with Microwaves

41 min
Breathing Life into Legacy: An Open-Source Emulator of Legacy Apple Devices
A Dive into Reverse Engineering and Understanding the iPod…

59 min
Fernvale: An Open Hardware and Software Platform, Based on the (nominally) Closed-Source…
A Lawful Method for Converting Closed IP into Open IP

31 min