Search for "Ben" returned 8731 results

73 min
hacking smart phones
expanding the attack surface and then some

52 min
Personal experiences bringing technology and new media to disaster areas
Experiences from Iraq and post Katrina New Orleans

64 min
Sovereign Keys
A proposal for fixing attacks on CAs and DNSSEC

47 min
Small footprint inspection techniques for Android
Reverse engineering on Android platforms

61 min
SMS-o-Death
From analyzing to attacking mobile phones on a large scale.

63 min
Power gadgets with your own electricity
escape the basement and make the sun work for you

62 min
Automatic Algorithm Invention with a GPU
Hell Yeah, it's rocket science

82 min
Attacking NFC mobile phones
First look at the security of NFC mobile phones

79 min
OpenPCD / OpenPICC
Free RFID reader and emulator

38 min
Steam-Powered Telegraphy
A League of Telextraordinary Gentlemen present the marvel…

49 min
Lawful Interception in VoIP networks
Old Laws and New Technology the German Way

67 min
Life is a Holodeck!
An overview of holographic techniques

64 min
Who can you trust?
Opening Ceremony and Keynote

61 min
Defend your Freedoms Online: It's Political, Stupid!
A Positive agenda against the next ACTA, SOPA, and such

38 min
Autodafé: An Act of Software Torture
Presentation of an innovative buffer overflow uncovering…

40 min
The Joy of Intellectual Vampirism
Mindfucking with Shared Information

58 min
Analyzing a modern cryptographic RFID system
HID iClass demystified

63 min
Wireless Kernel Tweaking
or how B.A.T.M.A.N. learned to fly

50 min
Space Debris
Simulation of orbital debris and its impacts on space travel

58 min
Open Source, EU funding and Agile Methods
Sprint methodology in funded OSS projects

59 min
Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security
Console Hacking 2007

39 min