Search for "csk" returned 1261 results

Reverse engineering FPGAs
42 min

Reverse engineering FPGAs

Dissecting FPGAs from bottom up, extracting schematics and…

What could possibly go wrong with <insert x86 instruction here>?
55 min

What could possibly go wrong with <insert x86 instruction here>?

Side effects include side-channel attacks and bypassing…

Triggering Deep Vulnerabilities Using Symbolic Execution
45 min

Triggering Deep Vulnerabilities Using Symbolic Execution

Deep program analysis without the headache

Nach der Coronakrise ist mitten in der Klimakrise
55 min

Nach der Coronakrise ist mitten in der Klimakrise

Wege aus der Klimakrise - Was uns droht und was getan…

To Protect And Infect
45 min

To Protect And Infect

The militarization of the Internet

Firmware Fat Camp
42 min

Firmware Fat Camp

Embedded Security Using Binary Autotomy

„Nach bestem Wissen und Gewissen“ – Floskeln in der Politik
60 min

„Nach bestem Wissen und Gewissen“ – Floskeln in der Politik

Politische Phrasologie – warum man aus dem ganzen Zeug, das…

Electronic Bank Robberies
56 min

Electronic Bank Robberies

Stealing Money from ATMs with Malware

The Internet (Doesn&#39;t) Need Another Security Guide
62 min

The Internet (Doesn't) Need Another Security Guide

Creating Internet Privacy and Security Resources That Don't…

The Cloud Conspiracy 2008-2014
63 min

The Cloud Conspiracy 2008-2014

how the EU was hypnotised that the NSA did not exist

Self-encrypting deception
58 min

Self-encrypting deception

weaknesses in the encryption of solid state drives (SSDs)

avatar²
55 min

avatar²

Towards an open source binary firmware analysis framework