Search for "CAGE" returned 2694 results

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

Human Rights and Technology
32 min

Human Rights and Technology

"A New Hope" or "The Empire Strikes Back"?

What de.fac2?
29 min

What de.fac2?

Attacking an opensource U2F device in 30 minutes or less

Mastering the Maze
20 min

Mastering the Maze

Unleashing Reinforcement Learning in Penetration Testing…

Hardening hardware and choosing a #goodBIOS
47 min

Hardening hardware and choosing a #goodBIOS

Clean boot every boot - rejecting persistence of malicious…

The plain simple reality of entropy
60 min

The plain simple reality of entropy

Or how I learned to stop worrying and love urandom

35C3 Infrastructure Review
65 min

35C3 Infrastructure Review

Up and to the right: All the statistics about this event…

Locked up science
41 min

Locked up science

Tearing down paywalls in scholarly communication

Growing Up Software Development
31 min

Growing Up Software Development

From Hacker Culture to the Software of the Future

SELECT code_execution FROM * USING SQLite;
46 min

SELECT code_execution FROM * USING SQLite;

--Gaining code execution using a malicious SQLite database

Keys of Fury
25 min

Keys of Fury

Type In Beyond the Scrolling Horizon

Beyond your cable modem
60 min

Beyond your cable modem

How not to do DOCSIS networks

TrustZone-M(eh): Breaking ARMv8-M's security
57 min

TrustZone-M(eh): Breaking ARMv8-M's security

Hardware attacks on the latest generation of ARM Cortex-M…

Rettet uns die KI?
42 min

Rettet uns die KI?

Über die Zukunft der digitalen Inklusion