Search for "CAGE" returned 2619 results

Deconstructing a Socialist Lawnmower
56 min

Deconstructing a Socialist Lawnmower

Obsolete Technologies + Critical Material Studies in Media…

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

Harry Potter and the Not-So-Smart Proxy War
35 min

Harry Potter and the Not-So-Smart Proxy War

Taking a look at a covert CIA virtual fencing solution

SELECT code_execution FROM * USING SQLite;
46 min

SELECT code_execution FROM * USING SQLite;

--Gaining code execution using a malicious SQLite database

Hardening hardware and choosing a #goodBIOS
47 min

Hardening hardware and choosing a #goodBIOS

Clean boot every boot - rejecting persistence of malicious…

Tech(no)fixes beware!
45 min

Tech(no)fixes beware!

Spotting (digital) tech fictions as replacement for social…

Keys of Fury
25 min

Keys of Fury

Type In Beyond the Scrolling Horizon

Locked up science
41 min

Locked up science

Tearing down paywalls in scholarly communication

TrustZone-M(eh): Breaking ARMv8-M's security
57 min

TrustZone-M(eh): Breaking ARMv8-M's security

Hardware attacks on the latest generation of ARM Cortex-M…

Mr Beam goes Kickstarter
31 min

Mr Beam goes Kickstarter

Lessons learned from crowdfunding a hardware project

Quantum Cryptography
60 min

Quantum Cryptography

from key distribution to position-based cryptography