Search for "Lee" returned 2381 results

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

Hardening hardware and choosing a #goodBIOS
47 min

Hardening hardware and choosing a #goodBIOS

Clean boot every boot - rejecting persistence of malicious…

TamaGo - bare metal Go framework for ARM SoCs.
59 min

TamaGo - bare metal Go framework for ARM SoCs.

Reducing the attack surface with pure embedded Go.

net neutrality: days of future past?
60 min

net neutrality: days of future past?

Taking stock after two years of net neutrality in the…

So you want to build a satellite?
60 min

So you want to build a satellite?

How hard can it be? An introduction into CubeSat development

Thwarting Evil Maid Attacks
58 min

Thwarting Evil Maid Attacks

Physically Unclonable Functions for Hardware Tamper…

The Economic Consequences of Internet Censorship
31 min

The Economic Consequences of Internet Censorship

Why Censorship is a Bad Idea for Everyone

Flohmarkt
43 min

Flohmarkt

Eine dezentrale föderierte Inseratplattform

Regulating Autonomous Weapons
25 min

Regulating Autonomous Weapons

The time travelling android isn’t even our biggest problem

Automatically Subtitling the C3
30 min

Automatically Subtitling the C3

How speech processing helps the CCC subtitle project, and…