Search for "jk" returned 2226 results

46 min
It's not safe on the streets... especially for your 3DS!
Exploring a new attack surface on the 3DS

60 min
the possibility of an army
phone verified accounts bringing the Hessian army back to…

60 min
Unpatchable
Living with a vulnerable implanted device

47 min
Android DDI
Dynamic Dalvik Instrumentation of Android Applications and…

66 min
Advanced Hexagon Diag
Harnessing diagnostics for baseband vulnerability research

35 min
Simulating the future of the global agro-food system
Cybernetic models analyze scenarios of interactions between…

59 min
We should share our secrets
Shamir secret sharing: How it works and how to implement it

30 min
apertus° AXIOM
The first Open Source Cinema Camera

62 min
radare demystified
after 1.0

59 min
How to teach programming to your loved ones
Enabling students over example-driven teaching

61 min
Trustworthy secure modular operating system engineering
fun(ctional) operating system and security protocol…

48 min
Don't Ruck Us Too Hard - Owning Ruckus AP Devices
3 different RCE vulnerabilities on Ruckus Wireless access…

59 min
Let's build a quantum computer!
Understanding the architecture of a quantum processor

40 min
Infrastructures in a horizontal farmers community
Human agreements, comunication infrastructures, services in…

60 min