Search for "Ray" returned 3325 results

Triggering Deep Vulnerabilities Using Symbolic Execution
45 min

Triggering Deep Vulnerabilities Using Symbolic Execution

Deep program analysis without the headache

Ceph, ELK & opensuse
20 min

Ceph, ELK & opensuse

This talk will be held by Denys Kondratenko and Abhishek…

Visualization of networks using physics
36 min

Visualization of networks using physics

How algorithms inspired by the laws of physics can create…

Ghidra - An Open Source Reverse Engineering Tool
60 min

Ghidra - An Open Source Reverse Engineering Tool

How the NSA open-sourced all software in 2019

BOLSONARO IS AN ENVIRONMENTAL CATASTROPH!
66 min

BOLSONARO IS AN ENVIRONMENTAL CATASTROPH!

How the rise of bolsonsarism culminate in the Burning of…

We should share our secrets
59 min

We should share our secrets

Shamir secret sharing: How it works and how to implement it

Inside Field Station Berlin Teufelsberg
55 min

Inside Field Station Berlin Teufelsberg

The story of the NSA listening post – told by an ex-SIGINT…