Search for "Jong-Hoon Lee" returned 548 results
40 min
Live, Die, Repeat
The fight against data retention and boundless access to…
61 min
Now I sprinkle thee with crypto dust
Internet reengineering session
58 min
Baseband Exploitation in 2013
Hexagon challenges
54 min
How hackers grind an MMORPG: by taking it apart!
An introduction to reverse engineering network protocols
60 min
Beyond your cable modem
How not to do DOCSIS networks
58 min
Virtual Machine Introspection
From the Outside Looking In
60 min
The Exploration and Exploitation of an SD Memory Card
by xobs & bunnie
35 min
Ethics in the data society
Power and politics in the development of the driverless car
41 min
NGI Zero: A treasure trove of IT innovation
Resilient. Trustworthy. Sustainably Open.
60 min
osmo-gmr: What's up with sat-phones ?
Piecing together the missing bits
59 min
Let's build a quantum computer!
Understanding the architecture of a quantum processor
28 min
Long war tactics
or how we learned to stop worrying and love the NSA
57 min
The Precariat: A Disruptive Class for Disruptive Times.
Why and How the Precariat will define the Global…
61 min
Nintendo Hacking 2016
Game Over
33 min