Search for " Leo" returned 1768 results
39 min
ID Cards in China: Your Worst Nightmare
In China Your ID Card Knows Everything
60 min
Opening Closed Systems with GlitchKit
'Liberating' Firmware from Closed Devices with Open Source…
60 min
Windows drivers attack surface
some 'new' insights
55 min
ZombieLoad Attack
Leaking Your Recent Memory Operations on Intel CPUs
61 min
RAMN: Resistant Automotive Miniature Network
A safe platform to study and research automotive systems
35 min
Harry Potter and the Not-So-Smart Proxy War
Taking a look at a covert CIA virtual fencing solution
60 min
Ein Abgrund von Landesverrat
Wie es dazu kam und was daraus zu lernen ist
45 min
To Protect And Infect
The militarization of the Internet
30 min
libusb: Maintainer fail
How I failed to run an open source project
43 min
Chat-Control
now is the time to take action!
44 min
Disclosure DOs, Disclosure DON'Ts
Pragmatic Advice for Security Researchers
59 min
Security of the IC Backside
The future of IC analysis
60 min
Quantum Cryptography
from key distribution to position-based cryptography
60 min
The Perl Jam 2
The Camel Strikes Back
39 min
Bits and Bytes in Microgravity
Insights into the hardware and software of sounding rockets
38 min