Search for "sECuRE" returned 800 results

TrustZone-M(eh): Breaking ARMv8-M's security
57 min

TrustZone-M(eh): Breaking ARMv8-M's security

Hardware attacks on the latest generation of ARM Cortex-M…

Open Source is no longer just for software:
28 min

Open Source is no longer just for software:

Why the community needs open source hardware to ensure…

OWASP ProActive Controls
69 min

OWASP ProActive Controls

Sichere Anwendungen erstellen?

Crypto Wars Part II
60 min

Crypto Wars Part II

The Empires Strike Back

Certificate Authority Collapse
61 min

Certificate Authority Collapse

Will the EU Succeed in Regulating HTTPS?

p≡p Sync
101 min

p≡p Sync

how it works

Wheel of Fortune
36 min

Wheel of Fortune

Analyzing Embedded OS Random Number Generators

Beyond Anti Evil Maid
60 min

Beyond Anti Evil Maid

Making it easier to avoid low-level compromise, and why…

Matrix as a Bridge
43 min

Matrix as a Bridge

Enabling Cross-Border Healthcare Communication Through Open…

Strong encryption of credit card information
51 min

Strong encryption of credit card information

Attacks on common failures when encrypting credit card…

How hackers grind an MMORPG: by taking it apart!
54 min

How hackers grind an MMORPG: by taking it apart!

An introduction to reverse engineering network protocols

Security of the IC Backside
59 min

Security of the IC Backside

The future of IC analysis

Console Security - Switch
56 min

Console Security - Switch

Homebrew on the Horizon