Search for "Ben" returned 8731 results

74 min
Transition Telecom
Telecommunications and networking during energy descent

63 min
Writing a Thumbdrive from Scratch
Prototyping Active Disk Antiforensics

62 min
Post Memory Corruption Memory Analysis
Automating exploitation of invalid memory writes

60 min
On working memory and mental imagery
How does the brain learn to think?

44 min
The Realtime thing
What the heck is realtime - and what to do with it

46 min
Automated Exploit Detection in Binaries
Finding exploitable vulnerabilities in binaries

63 min
Transparency and Privacy
The 7 Laws of Identity and the Identity Metasystem

40 min
Privacy Invasion or Innovative Science?
Academia, social media data, and privacy

45 min
ESXi Beast
Exploiting VMWARE ESXi Binary Protocols Using CANAPE

56 min
USB and libusb
So much more than a serial port with power

36 min
Having fun with RTP
„Who is speaking???“

50 min
Fnord News Show (English interpretation)
We help in seeing teh Fnords

41 min
DC+, The Protocol
Technical defense against data retention law

58 min
Linguistic Hacking
How to know what a text in an unknown language is about?

43 min
Nintendo DS
Introduction and hacking

34 min
Lying To The Neighbours
Nasty effects with tracker-less BitTorrent

76 min
Messing Around with Garage Doors
Breaking Remote Keyless Entry Systems with Power Analysis

50 min
Design Noir
The seedy underbelly of electronic engineering

56 min