Search for "Apex" returned 172 results

Triggering Deep Vulnerabilities Using Symbolic Execution
45 min

Triggering Deep Vulnerabilities Using Symbolic Execution

Deep program analysis without the headache

TrustZone-M(eh): Breaking ARMv8-M's security
57 min

TrustZone-M(eh): Breaking ARMv8-M's security

Hardware attacks on the latest generation of ARM Cortex-M…

Quantum Computing: Are we there yet?
61 min

Quantum Computing: Are we there yet?

An introduction to quantum computing and a review of the…

Reconstructing narratives
63 min

Reconstructing narratives

transparency in the service of justice

What is Good Technology?
55 min

What is Good Technology?

Answers & practical guidelines for engineers.

Visiting The Bear Den
59 min

Visiting The Bear Den

A Journey in the Land of (Cyber-)Espionage

Decoding Contactless (Card) Payments
58 min

Decoding Contactless (Card) Payments

An Exploration of NFC Transactions and Explanation How…

Internet censorship in the Catalan referendum
50 min

Internet censorship in the Catalan referendum

Overview of how the state censored and how it got…

Understanding millions of gates
35 min

Understanding millions of gates

Introduction to IC reverse engineering for…

Theater und Quantenzeitalter
57 min

Theater und Quantenzeitalter

„Die Parallelwelt“- Das Schauspiel Dortmund und die…