Search for "Erik" returned 194 results

Lockpicking in the IoT
60 min

Lockpicking in the IoT

...or why adding BTLE to a device sometimes isn't smart at…

My Robot Will Crush You With Its Soft Delicate Hands!
60 min

My Robot Will Crush You With Its Soft Delicate Hands!

How to design and fabricate soft robots using everyday…

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

A Blockchain Picture Book
36 min

A Blockchain Picture Book

Blockchain origins and related buzzwords, described in…

A Tale of Two Leaks:
31 min

A Tale of Two Leaks:

How Hackers Breached the Great Firewall of China

Tactical Embodiment
54 min

Tactical Embodiment

Activism and Performance In Hostile Spaces Online

Exploiting PHP7 unserialize
44 min

Exploiting PHP7 unserialize

teaching a new dog old tricks

SELECT code_execution FROM * USING SQLite;
46 min

SELECT code_execution FROM * USING SQLite;

--Gaining code execution using a malicious SQLite database

Why Do We Anthropomorphize Computers?...
32 min

Why Do We Anthropomorphize Computers?...

...and dehumanize ourselves in the process?

ASLR on the line
44 min

ASLR on the line

Practical cache attacks on the MMU