Search for "Mike Place" returned 1110 results

54 min
World War II Hackers
Stalin's best men, armed with paper and pen

60 min
Software Defined Emissions
A hacker’s review of Dieselgate

59 min
Memory Deduplication: The Curse that Keeps on Giving
A tale of 3 different memory deduplication based…

66 min
Advanced Hexagon Diag
Harnessing diagnostics for baseband vulnerability research

30 min
Automatically Subtitling the C3
How speech processing helps the CCC subtitle project, and…

54 min
How hackers grind an MMORPG: by taking it apart!
An introduction to reverse engineering network protocols

45 min
Triggering Deep Vulnerabilities Using Symbolic Execution
Deep program analysis without the headache

59 min
The Surveillance State limited by acts of courage and conscience
An update on the fate of the Snowden Refugees

42 min
Wifibroadcast
How to convert standard wifi dongles into digital broadcast…

36 min
Understanding the Snooper’s Charter
Theresa May’s effort to abolish privacy

60 min
Everything you always wanted to know about Certificate Transparency
(but were afraid to ask)

60 min
A Story of Discrimination and Unfairness
Prejudice in Word Embeddings

19 min