Search for "Ben" returned 8731 results

Transition Telecom
74 min

Transition Telecom

Telecommunications and networking during energy descent

Writing a Thumbdrive from Scratch
63 min

Writing a Thumbdrive from Scratch

Prototyping Active Disk Antiforensics

Post Memory Corruption Memory Analysis
62 min

Post Memory Corruption Memory Analysis

Automating exploitation of invalid memory writes

The Realtime thing
44 min

The Realtime thing

What the heck is realtime - and what to do with it

Automated Exploit Detection in Binaries
46 min

Automated Exploit Detection in Binaries

Finding exploitable vulnerabilities in binaries

Transparency and Privacy
63 min

Transparency and Privacy

The 7 Laws of Identity and the Identity Metasystem

Privacy Invasion or Innovative Science?
40 min

Privacy Invasion or Innovative Science?

Academia, social media data, and privacy

ESXi Beast
45 min

ESXi Beast

Exploiting VMWARE ESXi Binary Protocols Using CANAPE

USB and libusb
56 min

USB and libusb

So much more than a serial port with power

Having fun with RTP
36 min

Having fun with RTP

„Who is speaking???“

DC+, The Protocol
41 min

DC+, The Protocol

Technical defense against data retention law

Linguistic Hacking
58 min

Linguistic Hacking

How to know what a text in an unknown language is about?

Lying To The Neighbours
34 min

Lying To The Neighbours

Nasty effects with tracker-less BitTorrent

Messing Around with Garage Doors
76 min

Messing Around with Garage Doors

Breaking Remote Keyless Entry Systems with Power Analysis

Design Noir
50 min

Design Noir

The seedy underbelly of electronic engineering