Search for " Leo" returned 1822 results
37 min
Hacking (with) a TPM
Don't ask what you can do for TPMs, Ask what TPMs can do…
34 min
Social Cooling - big data’s unintended side effect
How the reputation economy is creating data-driven…
55 min
Graphs, Drones & Phones
The role of social-graphs for Drones in the War on Terror.
57 min
Everything you want to know about x86 microcode, but might have been afraid to ask
An introduction into reverse-engineering x86 microcode and…
33 min
Turing Complete User
What can be done to protect the term, the notion and the…
55 min
Vehicle immobilization revisited
Uncovering and assessing a second authentication mechanism…
60 min
On the insecure nature of turbine control systems in power generation
A security study of turbine control systems in power…
32 min
Technology and Mass Atrocity Prevention
Overview on Current Efforts - We Need Moar H4x0rs?!
30 min
Forging the USB armory
Creating an open source secure flash-drive-sized computer
43 min
unexpected coffee
a dive into industrial coffee machines
60 min
HAL - The Open-Source Hardware Analyzer
A dive into the foundations of hardware reverse engineering…
58 min
CHINTERNET ART
Creativity, Archives & Digital Media from the Chinese…
51 min
Wireless Drivers: Freedom considered harmful?
An OpenWrt perspective on the development of Linux 802.11…
42 min
Domain Name System
Hierarchical decentralized naming system used since 30 years
61 min