Search for "cbass"
prev
next
42 min
Real-world exploits and mitigations in Large Language Model…
60 min
A security study of turbine control systems in power…
38 min
Uncovering fake base stations on iOS devices
37 min
A Musical Adventure for Astronauts and the Space Cadets Who…
51 min
Guess what? The Government of Rafael Correa actually is…
59 min
Large Scale Authorship Attribution from Executable Binaries…
62 min
Pure capability-based security for UNIX
43 min
A hacker's view at commercial drone security
33 min
A view into technology on the other side of the world
58 min
An inside look at x86 CPU design
64 min
The Role of Stylometry in Privacy
29 min
Several failure modes of the hacker scene
prev
next