Search for "Joi Ito" returned 1255 results

What could possibly go wrong with <insert x86 instruction here>?
55 min

What could possibly go wrong with <insert x86 instruction here>?

Side effects include side-channel attacks and bypassing…

Security of the IC Backside
59 min

Security of the IC Backside

The future of IC analysis

World War II Hackers
54 min

World War II Hackers

Stalin's best men, armed with paper and pen

Demystifying Network Cards
31 min

Demystifying Network Cards

Things you always wanted to know about NIC drivers

Protecting the Wild
57 min

Protecting the Wild

Conservation Genomics between Taxonomy, Big Data,…

The Global Assassination Grid
63 min

The Global Assassination Grid

The Infrastructure and People behind Drone Killings

Home Distilling
28 min

Home Distilling

Theory and practice of moonshining and legal distilling

What de.fac2?
29 min

What de.fac2?

Attacking an opensource U2F device in 30 minutes or less

A deep dive into the world of DOS viruses
38 min

A deep dive into the world of DOS viruses

Explaining in detail just how those little COM files…

Jailbreaking iOS
47 min

Jailbreaking iOS

From past to present

CAESAR and NORX
61 min

CAESAR and NORX

Developing the Future of Authenticated Encryption

SearchWing
45 min

SearchWing

Open source drones for Search & Rescue

Beyond Anti Evil Maid
60 min

Beyond Anti Evil Maid

Making it easier to avoid low-level compromise, and why…

The Fight for Encryption in 2016
60 min

The Fight for Encryption in 2016

Crypto fight in the Wake of Apple v. FBI