Search for "ar3itrary" returned 239 results

Jailbreaking iOS
47 min

Jailbreaking iOS

From past to present

Code Pointer Integrity
61 min

Code Pointer Integrity

... or how we battle the daemons of memory safety

The Gospel of IRMA
55 min

The Gospel of IRMA

Attribute Based Credentials in Practice

Wind: Off-Grid Services for Everyday People
60 min

Wind: Off-Grid Services for Everyday People

Integrating nearby and offline connectivity with the…

Decoding the LoRa PHY
64 min

Decoding the LoRa PHY

Dissecting a Modern Wireless Network for the Internet of…

Attacking Chrome IPC
54 min

Attacking Chrome IPC

Reliably finding bugs to escape the Chrome sandbox

Quantum Cryptography
60 min

Quantum Cryptography

from key distribution to position-based cryptography

Attacking end-to-end email encryption
60 min

Attacking end-to-end email encryption

Efail, other attacks and lessons learned.

Trustworthy secure modular operating system engineering
61 min

Trustworthy secure modular operating system engineering

fun(ctional) operating system and security protocol…

Long Distance Quantum Communication
36 min

Long Distance Quantum Communication

Concepts and components for intercontinal communication…

Domain Name System
42 min

Domain Name System

Hierarchical decentralized naming system used since 30 years

Making machines that make
46 min

Making machines that make

rapid prototyping of digital fabrication and…

Intel Management Engine deep dive
60 min

Intel Management Engine deep dive

Understanding the ME at the OS and hardware level