Search for "olf" returned 7202 results
45 min
Finding and Preventing Buffer Overflows
An overview of static and dynamic approaches
57 min
802.11 Packets in Packets
A Standard-Compliant Exploit of Layer 1
62 min
Vehicular Communication and VANETs
The future and security of communicating vehicles
59 min
Let's build a quantum computer!
Understanding the architecture of a quantum processor
29 min
Infocalypse now: P0wning stuff is not enough
Several failure modes of the hacker scene
40 min
“You press the button, we do the rest”
Exploring the material basis of digital photography by…
51 min
postmarketOS - Digital Independence in Your Pocket
How we can get back control of our phones
58 min
Are all BSDs created equally?
A survey of BSD kernel vulnerabilities.
59 min
Here Be Electric Dragons
Preparing for the Emancipation of Machines
41 min
Homewreckery
Electrifying the Thread out of Clothing
64 min
Source Code and Cross-Domain Authorship Attribution
The Role of Stylometry in Privacy
65 min
PicoLisp Application Development
Interactive development of PicoLisp database applications
56 min
Console Hacking 2008: Wii Fail
Is implementation the enemy of design?
58 min
Operation Triangulation
What You Get When Attack iPhones of Researchers
30 min
Syrian Archive
Preserving documentation of human rights violations
55 min
Our daily job: hacking the law
The key elements of policy hacking
52 min
WiFi Long Shots
Wireless connections of 20km and more
58 min
The Infinite Library
Storage and Access of Pornographic Information
61 min
CAESAR and NORX
Developing the Future of Authenticated Encryption
21 min