Search for "Majid"
58 min
Physically Unclonable Functions for Hardware Tamper…
60 min
Making it easier to avoid low-level compromise, and why…
47 min
Clean boot every boot - rejecting persistence of malicious…
48 min
How to get the Triforce on an N64 via controller input
60 min
How Betrusted Aims to Close the Hardware TOCTOU Gap
29 min
Several failure modes of the hacker scene
58 min
Ein Computerwurm für PLCs