Search for "cbass" returned 400 results
60 min
On the insecure nature of turbine control systems in power generation
A security study of turbine control systems in power…
58 min
When hardware must „just work“
An inside look at x86 CPU design
64 min
Source Code and Cross-Domain Authorship Attribution
The Role of Stylometry in Privacy
38 min
What your phone won’t tell you
Uncovering fake base stations on iOS devices
42 min
Domain Name System
Hierarchical decentralized naming system used since 30 years
37 min
Music on Mars?
A Musical Adventure for Astronauts and the Space Cadets Who…
31 min
Sysadmins of the world, unite!
a call to resistance
31 min
Make the Internet Neutral Again
Let's put the new EU Net Neutrality rules to work
29 min
Infocalypse now: P0wning stuff is not enough
Several failure modes of the hacker scene
58 min