Search for "ar3itrary" returned 243 results

57 min
Everything you want to know about x86 microcode, but might have been afraid to ask
An introduction into reverse-engineering x86 microcode and…

29 min
The Pirate Cinema
Creating mash-up movies by hidden activity and geography of…

58 min
Switches Get Stitches
Industrial System Ownership

60 min
Wind: Off-Grid Services for Everyday People
Integrating nearby and offline connectivity with the…

60 min
On the insecure nature of turbine control systems in power generation
A security study of turbine control systems in power…

54 min
Attacking Chrome IPC
Reliably finding bugs to escape the Chrome sandbox

61 min
Trustworthy secure modular operating system engineering
fun(ctional) operating system and security protocol…

61 min
Code Pointer Integrity
... or how we battle the daemons of memory safety

60 min
Attacking end-to-end email encryption
Efail, other attacks and lessons learned.

55 min
The Gospel of IRMA
Attribute Based Credentials in Practice

64 min
Decoding the LoRa PHY
Dissecting a Modern Wireless Network for the Internet of…

36 min
Long Distance Quantum Communication
Concepts and components for intercontinal communication…

60 min
Quantum Cryptography
from key distribution to position-based cryptography

42 min