Search for "jk" returned 2226 results

Media Coverage and the Public in the Surveillance Society
60 min

Media Coverage and the Public in the Surveillance Society

Findings from a Research Project on Digital Surveillance…

How (not) to build autonomous robots
54 min

How (not) to build autonomous robots

Fables from building a startup in Silicon Valley

De-anonymizing Programmers
59 min

De-anonymizing Programmers

Large Scale Authorship Attribution from Executable Binaries…

Keys of Fury
25 min

Keys of Fury

Type In Beyond the Scrolling Horizon

Wireless Drivers: Freedom considered harmful?
51 min

Wireless Drivers: Freedom considered harmful?

An OpenWrt perspective on the development of Linux 802.11…

rad1o++
58 min

rad1o++

half a year later

ASLR on the line
44 min

ASLR on the line

Practical cache attacks on the MMU

Verified Firewall Ruleset Verification
32 min

Verified Firewall Ruleset Verification

Math, Functional Programming, Theorem Proving, and an…

WHWP
31 min

WHWP

Walter Höllerer bei WikiPedia

TrustZone is not enough
31 min

TrustZone is not enough

Hijacking debug components for embedded security

CounterStrike
46 min

CounterStrike

Lawful Interception

Security of the IC Backside
59 min

Security of the IC Backside

The future of IC analysis

Projekt Hannah
61 min

Projekt Hannah

Ein open-source Hardware- und Software-Design für…

Untrusting the CPU
61 min

Untrusting the CPU

A proposal for secure computing in an age where we cannot…

A deep dive into the world of DOS viruses
38 min

A deep dive into the world of DOS viruses

Explaining in detail just how those little COM files…