Search for "Mark" returned 1118 results

66 min
Hacking Diversity: The Politics of Inclusion in Open Technology Cultures
Christina Dunbar-Hester

60 min
Buffering sucks!
An attempt of calculating the economic cost of buffering.

52 min
Leaving legacy behind
Reducing carbon footprint of network services with MirageOS…

57 min
The Layman's Guide to Zero-Day Engineering
A demystification of the exploit development lifecycle

60 min
My Robot Will Crush You With Its Soft Delicate Hands!
How to design and fabricate soft robots using everyday…

57 min
TrustZone-M(eh): Breaking ARMv8-M's security
Hardware attacks on the latest generation of ARM Cortex-M…

41 min
Why Railway Is Safe But Not Secure
Security Of Railway Communication Protocols

46 min
You can -j REJECT but you can not hide: Global scanning of the IPv6 Internet
Finding interesting targets in 128bit of entropy

62 min
Einführung in Smartphone Malware Forensik
Wie man Stalkerware und Staatstrojaner auf Smartphones…

41 min
Extracting keys from FPGAs, OTP Tokens and Door Locks
Side-Channel (and other) Attacks in Practice

55 min
Vehicle immobilization revisited
Uncovering and assessing a second authentication mechanism…

120 min
Hacker Jeopardy
Zahlenraten für Geeks

117 min
Fnord News Show
Der schonungslose Realitätsabgleich mit…

61 min