Search for "jk" returned 2226 results

60 min
Media Coverage and the Public in the Surveillance Society
Findings from a Research Project on Digital Surveillance…

54 min
How (not) to build autonomous robots
Fables from building a startup in Silicon Valley

59 min
De-anonymizing Programmers
Large Scale Authorship Attribution from Executable Binaries…

25 min
Keys of Fury
Type In Beyond the Scrolling Horizon

51 min
Wireless Drivers: Freedom considered harmful?
An OpenWrt perspective on the development of Linux 802.11…

44 min
ASLR on the line
Practical cache attacks on the MMU

32 min
Verified Firewall Ruleset Verification
Math, Functional Programming, Theorem Proving, and an…

31 min
TrustZone is not enough
Hijacking debug components for embedded security

46 min
CounterStrike
Lawful Interception

59 min
Security of the IC Backside
The future of IC analysis

91 min
What the World can learn from Hongkong
From Unanimity to Anonymity

61 min
Projekt Hannah
Ein open-source Hardware- und Software-Design für…

61 min
Untrusting the CPU
A proposal for secure computing in an age where we cannot…

38 min