Search for "Steve" returned 217 results

Chip and PIN is Broken
57 min

Chip and PIN is Broken

Vulnerabilities in the EMV Protocol

Covert channels in TCP/IP: attack and defence
42 min

Covert channels in TCP/IP: attack and defence

Creation and detection of IP steganography for covert…

Detecting temperature through clock skew
62 min

Detecting temperature through clock skew

Hot or Not: Defeating anonymity by monitoring clock skew to…

The A5 Cracking Project
61 min

The A5 Cracking Project

Practical attacks on GSM using GNU Radio and FPGAs