Search for "sECuRE"
prev
next
33 min
Intrusion and Exfiltration in Server-less Architectures
60 min
Living with a vulnerable implanted device
55 min
Failures, Challenges, and the Future
59 min
Shamir secret sharing: How it works and how to implement it
51 min
What goes into playing defence and what can be holding you…
47 min
Clean boot every boot - rejecting persistence of malicious…
39 min
The next big privacy heist
61 min
Tamper Proofing Commodity Hardware and other Applications
39 min
Spoiler: Apple is bad at patching
51 min
Tiffany Rad, Teague Newman, John Strauchs
prev
next