Search for "Sec" returned 2697 results

Enclosure-PUF
61 min

Enclosure-PUF

Tamper Proofing Commodity Hardware and other Applications

37C3 Infrastructure Review
71 min

37C3 Infrastructure Review

Teams presenting how they helped making this awesome event

Power-to-X
47 min

Power-to-X

How to make (nearly) everything from electricity.

How does the Internet work?
50 min

How does the Internet work?

An explanation of Inter-Net and everyday protocols

Decoding Contactless (Card) Payments
58 min

Decoding Contactless (Card) Payments

An Exploration of NFC Transactions and Explanation How…

Demoscene now and then
41 min

Demoscene now and then

The demoscene is an underground computer art culture.

SELECT code_execution FROM * USING SQLite;
46 min

SELECT code_execution FROM * USING SQLite;

--Gaining code execution using a malicious SQLite database

Ghidra - An Open Source Reverse Engineering Tool
60 min

Ghidra - An Open Source Reverse Engineering Tool

How the NSA open-sourced all software in 2019

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities