Search for "CAGE" returned 2694 results

32 min
Finding the Weak Crypto Needle in a Byte Haystack
Automatic detection of key-reuse vulnerabilities

32 min
Human Rights and Technology
"A New Hope" or "The Empire Strikes Back"?

29 min
What de.fac2?
Attacking an opensource U2F device in 30 minutes or less

20 min
Mastering the Maze
Unleashing Reinforcement Learning in Penetration Testing…

47 min
Hardening hardware and choosing a #goodBIOS
Clean boot every boot - rejecting persistence of malicious…

60 min
The plain simple reality of entropy
Or how I learned to stop worrying and love urandom

65 min
35C3 Infrastructure Review
Up and to the right: All the statistics about this event…

41 min
Locked up science
Tearing down paywalls in scholarly communication

31 min
Growing Up Software Development
From Hacker Culture to the Software of the Future

46 min
SELECT code_execution FROM * USING SQLite;
--Gaining code execution using a malicious SQLite database

25 min
Keys of Fury
Type In Beyond the Scrolling Horizon

58 min
Wie klimafreundlich ist Software?
Einblicke in die Forschung und Ausblick in die…

60 min
Beyond your cable modem
How not to do DOCSIS networks

57 min
TrustZone-M(eh): Breaking ARMv8-M's security
Hardware attacks on the latest generation of ARM Cortex-M…

42 min