101. | Redox OS A safety first microkernel developed in Rust | 1 | |
|
102. | 34C3 ChaosWest Bisq A decentralized bitcoin exchange | 1 | |
|
103. | Walter Belgers Gigatron | 1 | |
|
104. | Fedora on RISC V 64 bit Introduction, Brief Overview and Latest Developments | 1 | |
|
105. | Investigating Malware Using Memory Forensics A Practical Approach | 1 | |
|
106. | Decompiler Internals Microcode | 1 | |
|
107. | Smalltalk Zerooverhead | 1 | |
|
108. | CPU performance analysis for MySQL using Hot Cold Flame Graph | 1 | |
|
109. | Camilo Galdos | 1 | |
|
110. | Will Dayble Design as if the User Is Drunk | 1 | |
|
111. | Post quantum digital signature with OQRNG optical quantum random number generator DefCamp 2019 | 1 | |
|
112. | RISC V Open Hardware for Your Open Source Software | 1 | |
|
113. | Breaches Are Everywhere What's a Good Security Leader to Do Richard Greenberg | 1 | |
|
114. | OpenWISP2 a self hosted solution to control OpenWRT LEDE devices | 1 | |
|
115. | Joe McCray You spent all that money m4v | 1 | |
|
116. | Alfredo Ortega y Sebastian Muñiz Satellite baseband mods Taking control of the InmarSat GMR 2 ph | 1 | |
|
117. | Troels Henriksen Futhark A data parallel pure functional programming language com | 1 | |
|
118. | Microarchitectural Attacks and the Case of Meltdown and Spectre Daniel Gruss | 1 | |
|
119. | SILUR Abusing the mastercard protocol to hack bitcoin into FIAT payment terminals | 1 | |
|
120. | LibrePCB Status Update The progress of LibrePCB within the last two years | 1 | Vlog |
|
121. | Compression Oracle Attacks on VPN Networks | 1 | |
|
122. | V6OPS 20201119 0900 | 1 | |
|
123. | H2HC Hangout 3 Novidades H2HC 2014 e Underground Hacker | 1 | |
|
124. | Reverse Engineering WhatsApp Encryption for Chat Manipulation and More | 1 | |
|
125. | tragedy oss quality 20 | 1 | |
|
126. | Writing Asynchronous SNMP Agents From a MIB file to a fully fledged Python application | 1 | |
|
127. | Introducing PS Attack, a portable PowerShell attack toolkit Jared Haight | 1 | |
|
128. | 30C3 2013 eng How to Build a Mind | 1 | Guide |
|
129. | Panel More Cyber Security through Digital Sovereignty | 1 | |
|
130. | IRMA's Idemix core Understanding the crypto behind selective, unlinkable attribute disclosu | 1 | |
|
131. | Babak Javadi Keith Howell 4140 Ways Your Alarm System Can Fail DerbyCon 2 | 1 | |
|
132. | TRAILER PART 1 FOR THE GLORY OF THE STATE MACHINE | 1 | |
|
133. | Unusual lock picking | 1 | |
|
134. | 23C3 2006 deu konrad zuse der rechnende raum | 1 | |
|
135. | Patrik Tjokorda BITCOIN PEER BANKING | 1 | |
|
136. | Rage against the kiosk Paul James Craig | 1 | |
|
137. | MODERN 20171115 0930 | 1 | |
|
138. | Efficient and interactive 3D point cloud processing Combining the strengths of pdal, ipyvolume and … | 1 | |
|
139. | Sam Patterson OPENBAZAAR 2 0 NOW IS THE TIME TO SHIFT TO A DECENTRALIZED MARKETPLACE | 1 | |
|
140. | Fractalide and Cantor A Racket application built with Flow Based Programming | 1 | |
|
141. | 23C3 2006 eng black ops 2006 | 1 | |
|
142. | LXDE | 1 | |
|
143. | Php And Friends Rofilingphpapplications | 1 | |
|
144. | Hannes Mehnert MirageOS Robust operation system design from the grounds up | 1 | |
|
145. | Passphrases for Humans A Cultural Approach to Passphrase Wordlist Generation | 1 | |
|
146. | Subecz Akos Biztonsagtechnikai hianyossagok Magyarorszagon a mindennapokban | 1 | |
|
147. | FASTEN Scaling static analyses to ecosystems | 1 | |
|
148. | Simon Munnery Adventures In Undertent Heating | 1 | |
|
149. | Gryffindor Pure JavaScript Covert Exploitation Matthew Toussain DerbyCon 8 | 1 | |
|
150. | Hunting Asynchronous Vulnerabilities Presented By James Kettle | 1 | |
|
151. | Caroline Sinders AI is More Than Math | 1 | |
|
152. | Kate Devlin Sex Robots The Truth Behind The Headlines | 1 | |
|
153. | NixOS, a functional GNU Linux distro | 1 | |
|
154. | 30C3 2013 eng HbbTV Security | 1 | |
|
155. | 305 Better Network Defense Through Threat Injection and Hunting Zach Grace Brian Genz DerbyCon 6 | 1 | |
|
156. | Hacking invisibly and silently with light and sound Matt Wixey | 1 | |
|
157. | 35C3 2018 Mind the Trap Die Netzpolitik der AfD im Bundestag | 1 | |
|
158. | WiFi practical hacking Show me the passwords DefCamp 2018 | 1 | |
|
159. | David Jorm AusCERT 2020 | 1 | |
|
160. | eBPF and XDP walkthrough and recent updates | 1 | Walkthrough |
|
161. | Adrian Wiesmann Fear, uncertain'ty and banking credentials | 1 | |
|
162. | 26C3 2009 eng wikileaks release 10 | 1 | |
|
163. | From Gtk to Qt An Strange Journey, part 2 The continuation of the original talk from Dirk Hohndel | 1 | |
|
164. | Olivier Thomas Hardware reverse engineering tools | 1 | |
|
165. | Gerd Leonhard IAPP Data Protection Congress 2016 | 1 | |
|
166. | DuckDB An Embeddable Analytical Database | 1 | |
|
167. | Modlishka Is a Mantis Eating 2FAs Lunch Lance Peterman DerbyCon 9 | 1 | |
|
168. | Tom Liston, RFC 3514 Compliant Pentesting Being Good While You're Being Bad | 0 | |
|
169. | JMAP 20201116 0730 | 0 | |
|
170. | IETF LAMPS 20210830 1730 | 0 | |
|
171. | DTN 20220726 1400 | 0 | |
|
172. | Enabling a Secure Software Supply Chain for Business Resiliency Niel Pandya & Jeremy Chua | 0 | |
|
173. | OAUTH WG Interim Meeting, 2020 04 13 | 0 | |
|
174. | Temporal The future is simple introducing the CRE Rob van der Veer • Spyros Gasteratos | 0 | |
|
175. | HTTPAPI 20220324 0900 | 0 | |
|
176. | Cassandra Brunetto Using OSINT To Catch An Online Predator | 0 | |
|
177. | iPlane An Information Plane for the Internet | 0 | Guide |
|
178. | Panel Discussion Characterizing Software Security as Business Risk 2 4 | 0 | Discussion |
|
179. | Be Ready for BeyondCorp enterprise identity, perimeters and your application Jason Kent | 0 | |
|
180. | SEDATE 20210727 1900 | 0 | |
|
181. | Monday Lightning Talks Andy Davidson | 0 | |
|
182. | OWASP Juice Shop Project Björn Kimminich | 0 | |
|
183. | BIER 20191121 1000 | 0 | |
|
184. | TEAS 20210309 1600 | 0 | |
|
185. | Supply Chain Anarchy Trojaned Binaries in the Java Ecosystem | 0 | |
|
186. | SECDISPATCH 20190722 1330 | 0 | |
|
187. | Micah Sherr Data plane Defenses against Routing Attacks on Tor | 0 | |
|
188. | Automatic Discovery of Privacy Utility Pareto Fronts | 0 | |
|
189. | SAAG 20171116 1330 | 0 | |
|
190. | NETMOD 20181106 0900 | 0 | |
|
191. | Day 1 afternoon Tuesday, July 24 | 0 | |
|
192. | Влияние привычных проблем безопасности веба 2 0 на безопасность блокчейн сетей | 0 | |
|
193. | ACME 20181108 1610 | 0 | |
|
194. | IETF 111 IRTF Open | 0 | |
|
195. | Matthew Wright A Wide Area Testbed for Tor | 0 | |
|
196. | Turning your Tech Hobby into a Tech Paycheck Elonka Dunin | 0 | |
|
197. | LSR 20210730 2300 | 0 | |
|
198. | Keynote Bill Cheswic 2 3 | 0 | |
|
199. | Introduction to BGP Dynamics Track and Routing Table Growth News at Eleven | 0 | |
|
200. | Large Scale Wireless Networks, UT's Case | 0 | |
|