Search for "nerd" returned 1994 results

61 min
Now I sprinkle thee with crypto dust
Internet reengineering session

55 min
What could possibly go wrong with <insert x86 instruction here>?
Side effects include side-channel attacks and bypassing…

58 min
How to Break PDFs
Breaking PDF Encryption and PDF Signatures

61 min
Damn Vulnerable Chemical Process
Exploitation in a new media

46 min
It's not safe on the streets... especially for your 3DS!
Exploring a new attack surface on the 3DS

33 min
Open source experimental incubator build up
call for participation in project and product development

41 min
POC (mit ISDN)
Frag die Teams

56 min
Rock' em Graphic Cards
Introduction to Heterogeneous Parallel Programming

61 min
An Elevator to the Moon (and back)
Space Transportation and the Extraterrestrial Imperative

41 min
MicroPython – Python for Microcontrollers
How high-level scripting languages make your hardware…

61 min
Uncaging Microchips
Techniques for Chip Preparation

62 min
The Tor Network
We're living in interesting times

38 min
A deep dive into the world of DOS viruses
Explaining in detail just how those little COM files…

61 min
Untrusting the CPU
A proposal for secure computing in an age where we cannot…

60 min
Unpatchable
Living with a vulnerable implanted device

61 min