Search for "mel" returned 2579 results

Infocalypse now: P0wning stuff is not enough
29 min

Infocalypse now: P0wning stuff is not enough

Several failure modes of the hacker scene

TrustZone-M(eh): Breaking ARMv8-M's security
57 min

TrustZone-M(eh): Breaking ARMv8-M's security

Hardware attacks on the latest generation of ARM Cortex-M…

How risky is the software you use?
58 min

How risky is the software you use?

CITL: Quantitative, Comparable Software Risk Reporting

"The" Social Credit System
61 min

"The" Social Credit System

Why It's Both Better and Worse Than We can Imagine

The Internet (Doesn't) Need Another Security Guide
62 min

The Internet (Doesn't) Need Another Security Guide

Creating Internet Privacy and Security Resources That Don't…

Toward a Cognitive "Quantified Self"
49 min

Toward a Cognitive "Quantified Self"

Activity Recognition for the Mind

Iridium Update
56 min

Iridium Update

more than just pagers

Hunting the Sigfox: Wireless IoT Network Security
38 min

Hunting the Sigfox: Wireless IoT Network Security

Dissecting the radio protocol of Sigfox, the global…

Hacking Ecology
60 min

Hacking Ecology

How Data Scientists can help to avoid a sixth global…

Boiling Mind
40 min

Boiling Mind

Analysing the link between audience physiology and…

Opening Closed Systems with GlitchKit
60 min

Opening Closed Systems with GlitchKit

'Liberating' Firmware from Closed Devices with Open Source…