Search for "Ike" returned 2649 results

The Great Escape of ESXi
40 min

The Great Escape of ESXi

Breaking Out of a Sandboxed Virtual Machine

goto fail;
63 min

goto fail;

exploring two decades of transport layer insecurity

Visceral Systems
32 min

Visceral Systems

Approaches to working with sound and network data…

Long war tactics
28 min

Long war tactics

or how we learned to stop worrying and love the NSA

World War II Hackers
54 min

World War II Hackers

Stalin's best men, armed with paper and pen

Through a PRISM, Darkly
63 min

Through a PRISM, Darkly

Everything we know about NSA spying

Baseband Exploitation in 2013
58 min

Baseband Exploitation in 2013

Hexagon challenges

How (not) to build autonomous robots
54 min

How (not) to build autonomous robots

Fables from building a startup in Silicon Valley

Why is GPG "damn near unusable"?
60 min

Why is GPG "damn near unusable"?

An overview of usable security research

Decoding Contactless (Card) Payments
58 min

Decoding Contactless (Card) Payments

An Exploration of NFC Transactions and Explanation How…

The seizure of the Iuventa
32 min

The seizure of the Iuventa

How search and rescue in the mediterranean was criminalized

Data Mining for Good
26 min

Data Mining for Good

Using random sampling, entity resolution, communications…