Search for "CBass" returned 380 results
60 min
On the insecure nature of turbine control systems in power generation
A security study of turbine control systems in power…
64 min
Source Code and Cross-Domain Authorship Attribution
The Role of Stylometry in Privacy
38 min
What your phone won’t tell you
Uncovering fake base stations on iOS devices
37 min
Music on Mars?
A Musical Adventure for Astronauts and the Space Cadets Who…
42 min
Domain Name System
Hierarchical decentralized naming system used since 30 years
42 min
Firmware Fat Camp
Embedded Security Using Binary Autotomy
31 min
Make the Internet Neutral Again
Let's put the new EU Net Neutrality rules to work
58 min
Taming the Chaos: Can we build systems that actually work?
Possible paths from today's ghastly hackery to what…
31 min
Growing Up Software Development
From Hacker Culture to the Software of the Future
29 min
Infocalypse now: P0wning stuff is not enough
Several failure modes of the hacker scene
59 min