Search for "ceres-c" returned 205 results

Writing secure software
46 min

Writing secure software

using my blog as example

The woman behind your WiFi
31 min

The woman behind your WiFi

Hedy Lamarr: Frequency Hopping in Hollywood

Self-encrypting deception
58 min

Self-encrypting deception

weaknesses in the encryption of solid state drives (SSDs)

Understanding millions of gates
35 min

Understanding millions of gates

Introduction to IC reverse engineering for…

Apple's iPhone 15: Under the C
36 min

Apple's iPhone 15: Under the C

Hardware hacking tooling for the new iPhone generation

Unlocking the Road Ahead: Automotive Digital Forensics
36 min

Unlocking the Road Ahead: Automotive Digital Forensics

A deep dive into an underrepresented research area

Dissecting VoLTE
49 min

Dissecting VoLTE

Exploiting Free Data Channels and Security Problems

Switches Get Stitches
58 min

Switches Get Stitches

Industrial System Ownership

TrustZone is not enough
31 min

TrustZone is not enough

Hijacking debug components for embedded security

Breaking Baryons
60 min

Breaking Baryons

On the Awesomeness of Particle Accelerators and Colliders

Weil „be excellent to each other” nicht reicht
61 min

Weil „be excellent to each other” nicht reicht

Über die Strukturen im Hintergrund: Awareness-Team und…