Search for "ar3itrary" returned 243 results

SELECT code_execution FROM * USING SQLite;
46 min

SELECT code_execution FROM * USING SQLite;

--Gaining code execution using a malicious SQLite database

Intel Management Engine deep dive
60 min

Intel Management Engine deep dive

Understanding the ME at the OS and hardware level

Making machines that make
46 min

Making machines that make

rapid prototyping of digital fabrication and…

Safe and Secure Drivers in High-Level Languages
61 min

Safe and Secure Drivers in High-Level Languages

How to write PCIe drivers in Rust, go, C#, Swift, Haskell,…

The Layman's Guide to Zero-Day Engineering
57 min

The Layman's Guide to Zero-Day Engineering

A demystification of the exploit development lifecycle

Deploying TLS 1.3: the great, the good and the bad
61 min

Deploying TLS 1.3: the great, the good and the bad

Improving the encrypted the web, one round-trip at a time

Disclosure DOs, Disclosure DON'Ts
44 min

Disclosure DOs, Disclosure DON'Ts

Pragmatic Advice for Security Researchers

Bug class genocide
47 min

Bug class genocide

Applying science to eliminate 100% of buffer overflows

Operation Triangulation
58 min

Operation Triangulation

What You Get When Attack iPhones of Researchers

So you want to build a satellite?
60 min

So you want to build a satellite?

How hard can it be? An introduction into CubeSat development