Parent directory/ | - | - |
RuhrSec 2017 0-RTT Key Exchange with Full Forward Secrecy , Prof. Dr. Tibor Jager.mp4 | 38.8 MiB | 2019 Oct 01 04:47 |
RuhrSec 2017 A new categorization system for Side-channel attacks on mo... , Dr. Veelasha Moonsamy.en.transcribed.srt | 87.1 KiB | 2019 Oct 01 04:47 |
RuhrSec 2017 A new categorization system for Side-channel attacks on mo... , Dr. Veelasha Moonsamy.mp4 | 42.0 MiB | 2019 Oct 01 04:47 |
RuhrSec 2017 Advanced SSL TLS Deployment Strategies , Frederik Braun.en.transcribed.srt | 47.5 KiB | 2019 Oct 01 04:47 |
RuhrSec 2017 Advanced SSL TLS Deployment Strategies , Frederik Braun.mp4 | 24.2 MiB | 2019 Oct 01 04:46 |
RuhrSec 2017 Black-Box Security Analysis of State Machine Implementations , Dr. Joeri de Ruiter.en.transcribed.srt | 105.9 KiB | 2019 Oct 01 04:47 |
RuhrSec 2017 Black-Box Security Analysis of State Machine Implementations , Dr. Joeri de Ruiter.mp4 | 61.6 MiB | 2019 Oct 01 04:47 |
RuhrSec 2017 Breaking and Fixing a Cryptocurrency , Martin Grothe.en.transcribed.srt | 106.9 KiB | 2019 Oct 01 04:47 |
RuhrSec 2017 Breaking and Fixing a Cryptocurrency , Martin Grothe.mp4 | 63.8 MiB | 2019 Oct 01 04:47 |
RuhrSec 2017 Five Years of Android Security Research the Good, the Bad... , Dr. Sven Bugiel.en.transcribed.srt | 119.7 KiB | 2019 Oct 01 04:47 |
RuhrSec 2017 Five Years of Android Security Research the Good, the Bad... , Dr. Sven Bugiel.mp4 | 59.1 MiB | 2019 Oct 01 04:47 |
RuhrSec 2017 How to Build Hardware Trojans , Prof. Dr. Christof Paar.en.transcribed.srt | 132.5 KiB | 2019 Oct 01 04:46 |
RuhrSec 2017 How to Build Hardware Trojans , Prof. Dr. Christof Paar.mp4 | 61.7 MiB | 2019 Oct 01 04:46 |
RuhrSec 2017 How to Hack Your Printer , Jens Müller.en.transcribed.srt | 91.4 KiB | 2019 Oct 01 04:47 |
RuhrSec 2017 How to Hack Your Printer , Jens Müller.mp4 | 46.8 MiB | 2019 Oct 01 04:47 |
RuhrSec 2017 Opening , Marcus Niemietz.mp4 | 12.4 MiB | 2019 Oct 01 04:47 |
RuhrSec 2017 Rowhammer Attacks A Walkthrough Guide , Dr. Clémentine Maurice & Daniel Gruss.en.transcribed.srt | 110.4 KiB | 2019 Oct 01 04:47 |
RuhrSec 2017 Rowhammer Attacks A Walkthrough Guide , Dr. Clémentine Maurice & Daniel Gruss.mp4 | 54.8 MiB | 2019 Oct 01 04:47 |
RuhrSec 2017 SSH Beyond Confidentiality and Integrity in Practice , Prof Dr. Kenny Paterson.en.transcribed.srt | 136.8 KiB | 2019 Oct 01 04:47 |
RuhrSec 2017 SSH Beyond Confidentiality and Integrity in Practice , Prof Dr. Kenny Paterson.mp4 | 81.6 MiB | 2019 Oct 01 04:47 |
RuhrSec 2017 Secrets of the Google Vulnerability Reward Program , Krzysztof Kotowicz.en.transcribed.srt | 97.2 KiB | 2019 Oct 01 04:47 |
RuhrSec 2017 Secrets of the Google Vulnerability Reward Program , Krzysztof Kotowicz.mp4 | 49.5 MiB | 2019 Oct 01 04:46 |
RuhrSec 2017 Teach a Man to Phish and You Feed Him for a Lifetime , Armin Buescher.en.transcribed.srt | 86.2 KiB | 2019 Oct 01 04:47 |
RuhrSec 2017 Teach a Man to Phish and You Feed Him for a Lifetime , Armin Buescher.mp4 | 88.4 MiB | 2019 Oct 01 04:47 |
RuhrSec 2017 The (In)Security of Automotive Remote Keyless Entry Systems..., Dr. David Oswald.en.transcribed.srt | 110.8 KiB | 2019 Oct 01 04:47 |
RuhrSec 2017 The (In)Security of Automotive Remote Keyless Entry Systems..., Dr. David Oswald.mp4 | 58.8 MiB | 2019 Oct 01 04:47 |
RuhrSec 2017 Using Microarchitectural Design to Break KASLR and More , Anders Fogh.en.transcribed.srt | 102.3 KiB | 2019 Oct 01 04:47 |
RuhrSec 2017 Using Microarchitectural Design to Break KASLR and More , Anders Fogh.mp4 | 55.3 MiB | 2019 Oct 01 04:46 |