Search for "Ben" returned 8963 results

Post Memory Corruption Memory Analysis
62 min

Post Memory Corruption Memory Analysis

Automating exploitation of invalid memory writes

The Realtime thing
44 min

The Realtime thing

What the heck is realtime - and what to do with it

Automated Exploit Detection in Binaries
46 min

Automated Exploit Detection in Binaries

Finding exploitable vulnerabilities in binaries

Transparency and Privacy
63 min

Transparency and Privacy

The 7 Laws of Identity and the Identity Metasystem

ESXi Beast
45 min

ESXi Beast

Exploiting VMWARE ESXi Binary Protocols Using CANAPE

Having fun with RTP
36 min

Having fun with RTP

„Who is speaking???“

DC+, The Protocol
41 min

DC+, The Protocol

Technical defense against data retention law

Linguistic Hacking
58 min

Linguistic Hacking

How to know what a text in an unknown language is about?

Reverse Engineering a real-world RFID payment system
58 min

Reverse Engineering a real-world RFID payment system

Corporations enabling citizens to print digital money

Certified programming with dependent types
86 min

Certified programming with dependent types

Because the future of defense is liberal application of math

Blinkenlights Stereoscope
65 min

Blinkenlights Stereoscope

Behind the scenes of the new light installation

The engineering part of social engineering
52 min

The engineering part of social engineering

Why just lying your way in won't get you anywhere

Stuff you don't see - every day
52 min

Stuff you don't see - every day

GNU Radio Internals - how to use the Framework

The A5 Cracking Project
61 min

The A5 Cracking Project

Practical attacks on GSM using GNU Radio and FPGAs

C64-DTV Hacking
57 min

C64-DTV Hacking

Revisiting the legendary computer in a joystick

Hacking SCADA
57 min

Hacking SCADA

how to own critical infrastructures