Search for "ar3itrary" returned 243 results

Everything you want to know about x86 microcode, but might have been afraid to ask
57 min

Everything you want to know about x86 microcode, but might have been afraid to ask

An introduction into reverse-engineering x86 microcode and…

The Pirate Cinema
29 min

The Pirate Cinema

Creating mash-up movies by hidden activity and geography of…

Switches Get Stitches
58 min

Switches Get Stitches

Industrial System Ownership

Wind: Off-Grid Services for Everyday People
60 min

Wind: Off-Grid Services for Everyday People

Integrating nearby and offline connectivity with the…

Attacking Chrome IPC
54 min

Attacking Chrome IPC

Reliably finding bugs to escape the Chrome sandbox

Trustworthy secure modular operating system engineering
61 min

Trustworthy secure modular operating system engineering

fun(ctional) operating system and security protocol…

Code Pointer Integrity
61 min

Code Pointer Integrity

... or how we battle the daemons of memory safety

Attacking end-to-end email encryption
60 min

Attacking end-to-end email encryption

Efail, other attacks and lessons learned.

The Gospel of IRMA
55 min

The Gospel of IRMA

Attribute Based Credentials in Practice

Decoding the LoRa PHY
64 min

Decoding the LoRa PHY

Dissecting a Modern Wireless Network for the Internet of…

Long Distance Quantum Communication
36 min

Long Distance Quantum Communication

Concepts and components for intercontinal communication…

Quantum Cryptography
60 min

Quantum Cryptography

from key distribution to position-based cryptography

Domain Name System
42 min

Domain Name System

Hierarchical decentralized naming system used since 30 years