Search for "ar3itrary"

Confessions of a future terrorist
58 min

Confessions of a future terrorist

A rough guide to over-regulating free speech with…

Kernel Tracing With eBPF
54 min

Kernel Tracing With eBPF

Unlocking God Mode on Linux

NEW IMPORTANT INSTRUCTIONS
42 min

NEW IMPORTANT INSTRUCTIONS

Real-world exploits and mitigations in Large Language Model…

Beyond Anti Evil Maid
60 min

Beyond Anti Evil Maid

Making it easier to avoid low-level compromise, and why…

No PoC? No Fix! - A sad Story about Bluetooth Security
43 min

No PoC? No Fix! - A sad Story about Bluetooth Security

It is just a broken memcpy in the Bluetooth stack. Do we…

Leaving legacy behind
52 min

Leaving legacy behind

Reducing carbon footprint of network services with MirageOS…

Self-encrypting deception
58 min

Self-encrypting deception

weaknesses in the encryption of solid state drives (SSDs)

CloudABI
62 min

CloudABI

Pure capability-based security for UNIX

Console Hacking
72 min

Console Hacking

Breaking the 3DS

Verified Firewall Ruleset Verification
32 min

Verified Firewall Ruleset Verification

Math, Functional Programming, Theorem Proving, and an…