Search for "sec" returned 2718 results
55 min
Revisiting SSL/TLS Implementations
New Bleichenbacher Side Channels and Attacks
55 min
Inside Field Station Berlin Teufelsberg
The story of the NSA listening post – told by an ex-SIGINT…
55 min
What could possibly go wrong with <insert x86 instruction here>?
Side effects include side-channel attacks and bypassing…
57 min
A New Dark Age
Turbulence, Big Data, AI, Fake News, and Peak Knowledge
42 min
Reverse engineering FPGAs
Dissecting FPGAs from bottom up, extracting schematics and…
39 min
Transmission Control Protocol
TCP/IP basics
61 min
Uncaging Microchips
Techniques for Chip Preparation
43 min
unexpected coffee
a dive into industrial coffee machines
43 min
Speaking Fiction To Power
Strategies and tactics to ‘hack’ public spaces and social…
10 min
Premiere: We love surveillance
#7reasons
44 min
ASLR on the line
Practical cache attacks on the MMU
59 min
Say hi to your new boss: How algorithms might soon control our lives.
Discrimination and ethics in the data-driven society
46 min
You can -j REJECT but you can not hide: Global scanning of the IPv6 Internet
Finding interesting targets in 128bit of entropy
41 min
Conquering Large Numbers at the LHC
From 1 000 000 000 000 000 to 10: Breaking down 14 Orders…
57 min