Search for "Gui" returned 1751 results

60 min
Intel Management Engine deep dive
Understanding the ME at the OS and hardware level

29 min
Pegasus internals
Technical Teardown of the Pegasus malware and Trident…

59 min
Talking Behind Your Back
On the Privacy & Security of the Ultrasound Tracking…

30 min
Privacy and Consumer Markets
Reversing the Surveillance Business Model

33 min
Structuring open hardware projects
experiences from the “i3 Berlin” 3D printer project with…

45 min
Triggering Deep Vulnerabilities Using Symbolic Execution
Deep program analysis without the headache

49 min
BREACH in Agda
Security notions, proofs and attacks using dependently…

60 min
Bullshit made in Germany
So hosten Sie Ihre De-Mail, E-Mail und Cloud direkt beim…

32 min
library operating systems
reject the default reality^W abstractions and substitute…

42 min
Wifibroadcast
How to convert standard wifi dongles into digital broadcast…

59 min
Election Cybersecurity Progress Report
Will the U.S. be ready for 2020?

42 min
Reverse engineering FPGAs
Dissecting FPGAs from bottom up, extracting schematics and…

40 min
Intercoms Hacking
Call the frontdoor to install your backdoors

55 min
What could possibly go wrong with <insert x86 instruction here>?
Side effects include side-channel attacks and bypassing…

66 min
Hacking Diversity: The Politics of Inclusion in Open Technology Cultures
Christina Dunbar-Hester

35 min
Understanding millions of gates
Introduction to IC reverse engineering for…

30 min
The Machine To Be Another
Exploring identity and empathy through neuroscience,…

61 min