Search for "xif" returned 1980 results

49 min
BREACH in Agda
Security notions, proofs and attacks using dependently…

60 min
From Computation to Consciousness
How computation helps to explain mind, universe and…

64 min
Source Code and Cross-Domain Authorship Attribution
The Role of Stylometry in Privacy

43 min
No PoC? No Fix! - A sad Story about Bluetooth Security
It is just a broken memcpy in the Bluetooth stack. Do we…

61 min
Untrusting the CPU
A proposal for secure computing in an age where we cannot…

49 min
Creating Resilient and Sustainable Mobile Phones
Be prepared for the coming Digital Winter. And play…

37 min
Inside the AMD Microcode ROM
(Ab)Using AMD Microcode for fun and security

60 min
Sneaking In Network Security
Enforcing strong network segmentation, without anyone…

60 min
Windows drivers attack surface
some 'new' insights

53 min
From Maxwell to antenna arrays
How 150 year old equations still help to communicate

33 min
Retail Surveillance / Retail Countersurveillance
50 most unwanted retail surveillance technologies / 50 most…

39 min