Search for "ceres-c" returned 205 results

46 min
Writing secure software
using my blog as example

31 min
The woman behind your WiFi
Hedy Lamarr: Frequency Hopping in Hollywood

58 min
Self-encrypting deception
weaknesses in the encryption of solid state drives (SSDs)

35 min
Understanding millions of gates
Introduction to IC reverse engineering for…

36 min
Apple's iPhone 15: Under the C
Hardware hacking tooling for the new iPhone generation

95 min
Platform System Interface
Design und Evaluation holistischer Computerarchitektur

60 min
Free Software and Hardware bring National Sovereignty
Gaza as a case study

36 min
Unlocking the Road Ahead: Automotive Digital Forensics
A deep dive into an underrepresented research area

49 min
Dissecting VoLTE
Exploiting Free Data Channels and Security Problems

58 min
Switches Get Stitches
Industrial System Ownership

31 min
TrustZone is not enough
Hijacking debug components for embedded security

60 min
A Story of Discrimination and Unfairness
Prejudice in Word Embeddings

60 min
Breaking Baryons
On the Awesomeness of Particle Accelerators and Colliders

61 min