Search for "merlin" returned 945 results

60 min
Windows drivers attack surface
some 'new' insights

54 min
How hackers grind an MMORPG: by taking it apart!
An introduction to reverse engineering network protocols

60 min
Check your privileges!
How to drop more of your privileges to reduce attack…

62 min
Superheroes Still Need Phoneboxes
The art of making a free phonebox and the culture of…

46 min
SELECT code_execution FROM * USING SQLite;
--Gaining code execution using a malicious SQLite database

60 min
Beyond Anti Evil Maid
Making it easier to avoid low-level compromise, and why…

60 min
Concepts for global TSCM
getting out of surveillance state mode

55 min
White-Box Cryptography
Survey

64 min
Magic Lantern
Free Software on Your Camera

57 min
“I feel like a criminal and I have to be god at the same time”
Perceptions of hackers and hacktivists on their…

65 min
Rocket science – how hard can it be?
First steps into space with sounding rockets

59 min
Security of the IC Backside
The future of IC analysis

60 min
The Fight for Encryption in 2016
Crypto fight in the Wake of Apple v. FBI

95 min
Hacker Jeopardy
Zahlenraten für Geeks

62 min