Search for "max" returned 4567 results
60 min
Breaking Baryons
On the Awesomeness of Particle Accelerators and Colliders
47 min
Energy Consumption of Data Centers
Problems and Solutions
42 min
NEW IMPORTANT INSTRUCTIONS
Real-world exploits and mitigations in Large Language Model…
59 min
De-anonymizing Programmers
Large Scale Authorship Attribution from Executable Binaries…
61 min
Untrusting the CPU
A proposal for secure computing in an age where we cannot…
58 min
Open Source Estrogen
From molecular colonization to molecular collaboration
53 min
The Ultimate Amiga 500 Talk
Amiga Hardware Design And Programming
51 min
Funky File Formats
Advanced binary tricks
35 min
Harry Potter and the Not-So-Smart Proxy War
Taking a look at a covert CIA virtual fencing solution
30 min
In Search of Evidence-Based IT-Security
IT security is largely a science-free field. This needs to…
57 min
TrustZone-M(eh): Breaking ARMv8-M's security
Hardware attacks on the latest generation of ARM Cortex-M…
32 min
Think big or care for yourself
On the obstacles to think of emergent technologies in the…
64 min
3 Years After Snowden: Is Germany fighting State Surveillance?
A Closer Look at the Political Reactions to Mass…
43 min
The Mars Rover On-board Computer
How Curiosity's Onboard Computer works, and what you can…
60 min
Prediction and Control
Watching Algorithms
31 min