Search for "Apex" returned 172 results

45 min
Triggering Deep Vulnerabilities Using Symbolic Execution
Deep program analysis without the headache

57 min
TrustZone-M(eh): Breaking ARMv8-M's security
Hardware attacks on the latest generation of ARM Cortex-M…

61 min
Quantum Computing: Are we there yet?
An introduction to quantum computing and a review of the…

55 min
Der PC-Wahl-Hack
Analyse einer Wahlsoftware

63 min
Reconstructing narratives
transparency in the service of justice

61 min
QualityLand
Lesung

55 min
What is Good Technology?
Answers & practical guidelines for engineers.

59 min
Visiting The Bear Den
A Journey in the Land of (Cyber-)Espionage

58 min
Decoding Contactless (Card) Payments
An Exploration of NFC Transactions and Explanation How…

55 min
White-Box Cryptography
Survey

50 min
Internet censorship in the Catalan referendum
Overview of how the state censored and how it got…

64 min
Cory Doctorow – Fireside Chat
Reading and Q&A

35 min
Understanding millions of gates
Introduction to IC reverse engineering for…

57 min