Search for "ar3itrary" returned 239 results

47 min
Jailbreaking iOS
From past to present

61 min
Code Pointer Integrity
... or how we battle the daemons of memory safety

55 min
The Gospel of IRMA
Attribute Based Credentials in Practice

60 min
Wind: Off-Grid Services for Everyday People
Integrating nearby and offline connectivity with the…

60 min
On the insecure nature of turbine control systems in power generation
A security study of turbine control systems in power…

64 min
Decoding the LoRa PHY
Dissecting a Modern Wireless Network for the Internet of…

54 min
Attacking Chrome IPC
Reliably finding bugs to escape the Chrome sandbox

60 min
Quantum Cryptography
from key distribution to position-based cryptography

60 min
Attacking end-to-end email encryption
Efail, other attacks and lessons learned.

61 min
Trustworthy secure modular operating system engineering
fun(ctional) operating system and security protocol…

36 min
Long Distance Quantum Communication
Concepts and components for intercontinal communication…

42 min
Domain Name System
Hierarchical decentralized naming system used since 30 years

46 min
Making machines that make
rapid prototyping of digital fabrication and…

60 min