Search for "ar3itrary" returned 269 results

Beyond Anti Evil Maid
60 min

Beyond Anti Evil Maid

Making it easier to avoid low-level compromise, and why…

CloudABI
62 min

CloudABI

Pure capability-based security for UNIX

NEW IMPORTANT INSTRUCTIONS
42 min

NEW IMPORTANT INSTRUCTIONS

Real-world exploits and mitigations in Large Language Model…

Verified Firewall Ruleset Verification
32 min

Verified Firewall Ruleset Verification

Math, Functional Programming, Theorem Proving, and an…

Leaving legacy behind
52 min

Leaving legacy behind

Reducing carbon footprint of network services with MirageOS…

Modchips of the State
36 min

Modchips of the State

Hardware implants in the supply-chain

No PoC? No Fix! - A sad Story about Bluetooth Security
43 min

No PoC? No Fix! - A sad Story about Bluetooth Security

It is just a broken memcpy in the Bluetooth stack. Do we…

Self-encrypting deception
58 min

Self-encrypting deception

weaknesses in the encryption of solid state drives (SSDs)

Everything you want to know about x86 microcode, but might have been afraid to ask
57 min

Everything you want to know about x86 microcode, but might have been afraid to ask

An introduction into reverse-engineering x86 microcode and…