Search for "Various Speakers" returned 201 results

58 min
Thwarting Evil Maid Attacks
Physically Unclonable Functions for Hardware Tamper…

59 min
Fernvale: An Open Hardware and Software Platform, Based on the (nominally) Closed-Source…
A Lawful Method for Converting Closed IP into Open IP

60 min
Lets break modern binary code obfuscation
A semantics based approach

33 min
Watching the changing Earth
warning: gravity ahead

58 min
Script Your Car!
Using existing hardware platforms to integrate python into…

60 min
Boeing 737MAX: Automated Crashes
Underestimating the dangers of designing a protection system

38 min
ARMore: Pushing Love Back Into Binaries
Aarch64 binary rewriting adventures but mostly pains

35 min
Harry Potter and the Not-So-Smart Proxy War
Taking a look at a covert CIA virtual fencing solution

41 min
Locked up science
Tearing down paywalls in scholarly communication

64 min
It Always Feels Like the Five Eyes Are Watching You
Five Eyes’ Quest For Security Has Given Us Widespread…

47 min
All cops are broadcasting
Obtaining the secret TETRA primitives after decades in the…

51 min
Virtual Secure Boot
Secure Boot support in qemu, kvm and ovmf.

22 min
Doping your Fitbit
On Fitbit Firmware Modifications and Data Extraction

31 min
Trackography
You never read alone

32 min
The seizure of the Iuventa
How search and rescue in the mediterranean was criminalized

44 min
Spot the Surveillance
How to Identify Police Surveillance at Protests and Large…

29 min