Search for "sECuRE" returned 792 results
60 min
Lets break modern binary code obfuscation
A semantics based approach
64 min
"Exploit" in theater
post-existentialism is the question, not post-privacy
53 min
No Love for the US Gov.
Why Lauri Love’s case is even more important than you…
46 min
SELECT code_execution FROM * USING SQLite;
--Gaining code execution using a malicious SQLite database
58 min
When hardware must „just work“
An inside look at x86 CPU design
63 min
Dissecting HDMI
Developing open, FPGA-based capture hardware for conference…
57 min
The Layman's Guide to Zero-Day Engineering
A demystification of the exploit development lifecycle
62 min
The Price Of Dissent
The surveillance state & modern day COINTELPRO tactics
60 min