Search for "Joi Ito" returned 1255 results

55 min
What could possibly go wrong with <insert x86 instruction here>?
Side effects include side-channel attacks and bypassing…

59 min
Security of the IC Backside
The future of IC analysis

54 min
World War II Hackers
Stalin's best men, armed with paper and pen

31 min
Demystifying Network Cards
Things you always wanted to know about NIC drivers

60 min
The Exploration and Exploitation of an SD Memory Card
by xobs & bunnie

57 min
Protecting the Wild
Conservation Genomics between Taxonomy, Big Data,…

63 min
The Global Assassination Grid
The Infrastructure and People behind Drone Killings

28 min
Home Distilling
Theory and practice of moonshining and legal distilling

29 min
What de.fac2?
Attacking an opensource U2F device in 30 minutes or less

38 min
A deep dive into the world of DOS viruses
Explaining in detail just how those little COM files…

47 min
Jailbreaking iOS
From past to present

61 min
CAESAR and NORX
Developing the Future of Authenticated Encryption

45 min
SearchWing
Open source drones for Search & Rescue

60 min
Beyond Anti Evil Maid
Making it easier to avoid low-level compromise, and why…

60 min