Search for "jk" returned 2287 results

Operation Triangulation
58 min

Operation Triangulation

What You Get When Attack iPhones of Researchers

Trustworthy secure modular operating system engineering
61 min

Trustworthy secure modular operating system engineering

fun(ctional) operating system and security protocol…

De-anonymizing Programmers
59 min

De-anonymizing Programmers

Large Scale Authorship Attribution from Executable Binaries…

The Internet (Doesn't) Need Another Security Guide
62 min

The Internet (Doesn't) Need Another Security Guide

Creating Internet Privacy and Security Resources That Don't…

Let's build a quantum computer!
59 min

Let's build a quantum computer!

Understanding the architecture of a quantum processor

Locked up science
41 min

Locked up science

Tearing down paywalls in scholarly communication

Intercoms Hacking
40 min

Intercoms Hacking

Call the frontdoor to install your backdoors

The rise and fall of Internet voting in Norway
60 min

The rise and fall of Internet voting in Norway

Evaluating a complex cryptographic implementation

Keys of Fury
25 min

Keys of Fury

Type In Beyond the Scrolling Horizon

Don't Ruck Us Too Hard - Owning Ruckus AP Devices
48 min

Don't Ruck Us Too Hard - Owning Ruckus AP Devices

3 different RCE vulnerabilities on Ruckus Wireless access…

Craft, leisure, and end-user innovation
32 min

Craft, leisure, and end-user innovation

How hacking is conceived in social science research

Infrastructures in a horizontal farmers community
40 min

Infrastructures in a horizontal farmers community

Human agreements, comunication infrastructures, services in…

ZombieLoad Attack
55 min

ZombieLoad Attack

Leaking Your Recent Memory Operations on Intel CPUs

Quantum Cryptography
60 min

Quantum Cryptography

from key distribution to position-based cryptography

Infocalypse now: P0wning stuff is not enough
29 min

Infocalypse now: P0wning stuff is not enough

Several failure modes of the hacker scene

Adventures in Reverse Engineering Broadcom NIC Firmware
60 min

Adventures in Reverse Engineering Broadcom NIC Firmware

Unlocking a system with 100% open source firmware

Damn Vulnerable Chemical Process
61 min

Damn Vulnerable Chemical Process

Exploitation in a new media