Hacker News new | past | comments | ask | show | jobs | submit | from login
Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains [pdf] (ruhr-uni-bochum.de)
3 points by g0xA52A2A on Oct 6, 2021 | past | 1 comment
Mailto: Me Your Secrets. On Bugs and Features in Email End-to-End Encryption [pdf] (ruhr-uni-bochum.de)
2 points by sashk on Aug 17, 2020 | past
IJON: Exploring deep state spaces via fuzzing [pdf] (ruhr-uni-bochum.de)
1 point by fanf2 on April 15, 2020 | past
Power Analysis: A Complete Break of the KeeLoq Code Hopping Scheme (2008) [pdf] (ruhr-uni-bochum.de)
17 points by garaetjjte on March 7, 2020 | past | 3 comments
Subliminal channels in cryptographic systems (2009) [pdf] (ruhr-uni-bochum.de)
4 points by _mtkq on Jan 16, 2020 | past
Reverse Engineering x86 Processor Microcode (2017) [pdf] (ruhr-uni-bochum.de)
3 points by peter_d_sherman on Oct 26, 2019 | past | 1 comment
(Un)Informed Consent: Studying GDPR Consent Notices in the Field [pdf] (ruhr-uni-bochum.de)
28 points by Tomte on Sept 11, 2019 | past | 14 comments
Reverse Engineering x86 Processor Microcode [pdf] (ruhr-uni-bochum.de)
3 points by peter_d_sherman on March 22, 2019 | past
On the In-Accuracy and Influence OfAndroid Pattern Strength Meters [pdf] (ruhr-uni-bochum.de)
2 points by DyslexicAtheist on Feb 25, 2019 | past
A Comparative Long-Term Study Of Fallback Authentication [pdf] (ruhr-uni-bochum.de)
13 points by DyslexicAtheist on Feb 25, 2019 | past
REDQUEEN: Fuzzing WithInput-To-State Correspondence [pdf] (ruhr-uni-bochum.de)
2 points by DyslexicAtheist on Feb 16, 2019 | past
Merkle Signature Schemes, Merkle Trees and Their Cryptanalysis [pdf] (ruhr-uni-bochum.de)
2 points by csdrane on Feb 10, 2019 | past
Red­queen: Fuz­zing with In­put-to-Sta­te Cor­re­spon­dence (ruhr-uni-bochum.de)
1 point by pentestercrab on Dec 19, 2018 | past
Nautilus: Fishing for Deep Bugs with Grammars [pdf] (ruhr-uni-bochum.de)
1 point by ingve on Dec 17, 2018 | past
ECFI: Asynchronous Control Flow Integrity for Programmable Logic Controllers [pdf] (ruhr-uni-bochum.de)
1 point by g0xA52A2A on Nov 18, 2018 | past
Using Morse code to study learning mechanisms in the brain (ruhr-uni-bochum.de)
2 points by lightlyused on Sept 18, 2016 | past
RUB researchers compile the largest astronomical image of all time. 46 gigapixel (ruhr-uni-bochum.de)
1 point by redtuesday on Nov 5, 2015 | past | 1 comment
The brain’s data compression mechanisms (ruhr-uni-bochum.de)
2 points by conductor on Dec 25, 2013 | past
The brain’s data compression mechanisms (ruhr-uni-bochum.de)
3 points by wrongc0ntinent on Dec 18, 2013 | past
Cost to defeat HDMI copy protection? A €200 FPGA. (ruhr-uni-bochum.de)
5 points by nodata on Nov 25, 2011 | past | 1 comment
3DES protected smartcard cracked with side channel analysis. (ruhr-uni-bochum.de)
28 points by ryanmolden on Nov 16, 2011 | past | 11 comments
Massive security flaws at Amazon Web Services discovered and remedied (ruhr-uni-bochum.de)
1 point by taylorbuley on Oct 26, 2011 | past
XML Encryption is insecure: Large companies affected (ruhr-uni-bochum.de)
6 points by llambda on Oct 22, 2011 | past

Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: