Search for "Benks" returned 120 results

35C3 Infrastructure Review
65 min

35C3 Infrastructure Review

Up and to the right: All the statistics about this event…

Simulating Universes
60 min

Simulating Universes

What Virtual Universes Can Tell Us About Our Own

Replication Prohibited
44 min

Replication Prohibited

3D printed key attacks

Code Pointer Integrity
61 min

Code Pointer Integrity

... or how we battle the daemons of memory safety

Disclosure DOs, Disclosure DON'Ts
44 min

Disclosure DOs, Disclosure DON'Ts

Pragmatic Advice for Security Researchers

Graphs, Drones & Phones
55 min

Graphs, Drones & Phones

The role of social-graphs for Drones in the War on Terror.

How to Break PDFs
58 min

How to Break PDFs

Breaking PDF Encryption and PDF Signatures

Decoding the LoRa PHY
64 min

Decoding the LoRa PHY

Dissecting a Modern Wireless Network for the Internet of…

Key-logger, Video, Mouse
49 min

Key-logger, Video, Mouse

How to turn your KVM into a raging key-logging monster

Breaking Baryons
60 min

Breaking Baryons

On the Awesomeness of Particle Accelerators and Colliders

Ecuador: how an authoritarian government is fooling the entire world
51 min

Ecuador: how an authoritarian government is fooling the entire world

Guess what? The Government of Rafael Correa actually is…