Search for "Benks" returned 120 results

65 min
35C3 Infrastructure Review
Up and to the right: All the statistics about this event…

60 min
Simulating Universes
What Virtual Universes Can Tell Us About Our Own

44 min
Replication Prohibited
3D printed key attacks

61 min
Code Pointer Integrity
... or how we battle the daemons of memory safety

44 min
Disclosure DOs, Disclosure DON'Ts
Pragmatic Advice for Security Researchers

61 min
Now I sprinkle thee with crypto dust
Internet reengineering session

55 min
Graphs, Drones & Phones
The role of social-graphs for Drones in the War on Terror.

58 min
How to Break PDFs
Breaking PDF Encryption and PDF Signatures

64 min
Decoding the LoRa PHY
Dissecting a Modern Wireless Network for the Internet of…

49 min
Key-logger, Video, Mouse
How to turn your KVM into a raging key-logging monster

60 min
Breaking Baryons
On the Awesomeness of Particle Accelerators and Colliders

69 min
cryptocurrencies, smart contracts, etc.: revolutionary tech?
short answer: Yes!

60 min
Everything you always wanted to know about Certificate Transparency
(but were afraid to ask)

51 min