| | Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains [pdf] (ruhr-uni-bochum.de) |
|
3 points by g0xA52A2A on Oct 6, 2021 | past | 1 comment
|
| | Mailto: Me Your Secrets. On Bugs and Features in Email End-to-End Encryption [pdf] (ruhr-uni-bochum.de) |
|
2 points by sashk on Aug 17, 2020 | past
|
| | IJON: Exploring deep state spaces via fuzzing [pdf] (ruhr-uni-bochum.de) |
|
1 point by fanf2 on April 15, 2020 | past
|
| | Power Analysis: A Complete Break of the KeeLoq Code Hopping Scheme (2008) [pdf] (ruhr-uni-bochum.de) |
|
17 points by garaetjjte on March 7, 2020 | past | 3 comments
|
| | Subliminal channels in cryptographic systems (2009) [pdf] (ruhr-uni-bochum.de) |
|
4 points by _mtkq on Jan 16, 2020 | past
|
| | Reverse Engineering x86 Processor Microcode (2017) [pdf] (ruhr-uni-bochum.de) |
|
3 points by peter_d_sherman on Oct 26, 2019 | past | 1 comment
|
| | (Un)Informed Consent: Studying GDPR Consent Notices in the Field [pdf] (ruhr-uni-bochum.de) |
|
28 points by Tomte on Sept 11, 2019 | past | 14 comments
|
| | Reverse Engineering x86 Processor Microcode [pdf] (ruhr-uni-bochum.de) |
|
3 points by peter_d_sherman on March 22, 2019 | past
|
| | On the In-Accuracy and Influence OfAndroid Pattern Strength Meters [pdf] (ruhr-uni-bochum.de) |
|
2 points by DyslexicAtheist on Feb 25, 2019 | past
|
| | A Comparative Long-Term Study Of Fallback Authentication [pdf] (ruhr-uni-bochum.de) |
|
13 points by DyslexicAtheist on Feb 25, 2019 | past
|
| | REDQUEEN: Fuzzing WithInput-To-State Correspondence [pdf] (ruhr-uni-bochum.de) |
|
2 points by DyslexicAtheist on Feb 16, 2019 | past
|
| | Merkle Signature Schemes, Merkle Trees and Their Cryptanalysis [pdf] (ruhr-uni-bochum.de) |
|
2 points by csdrane on Feb 10, 2019 | past
|
| | Redqueen: Fuzzing with Input-to-State Correspondence (ruhr-uni-bochum.de) |
|
1 point by pentestercrab on Dec 19, 2018 | past
|
| | Nautilus: Fishing for Deep Bugs with Grammars [pdf] (ruhr-uni-bochum.de) |
|
1 point by ingve on Dec 17, 2018 | past
|
| | ECFI: Asynchronous Control Flow Integrity for Programmable Logic Controllers [pdf] (ruhr-uni-bochum.de) |
|
1 point by g0xA52A2A on Nov 18, 2018 | past
|
| | Using Morse code to study learning mechanisms in the brain (ruhr-uni-bochum.de) |
|
2 points by lightlyused on Sept 18, 2016 | past
|
| | RUB researchers compile the largest astronomical image of all time. 46 gigapixel (ruhr-uni-bochum.de) |
|
1 point by redtuesday on Nov 5, 2015 | past | 1 comment
|
| | The brain’s data compression mechanisms (ruhr-uni-bochum.de) |
|
2 points by conductor on Dec 25, 2013 | past
|
| | The brain’s data compression mechanisms (ruhr-uni-bochum.de) |
|
3 points by wrongc0ntinent on Dec 18, 2013 | past
|
| | Cost to defeat HDMI copy protection? A €200 FPGA. (ruhr-uni-bochum.de) |
|
5 points by nodata on Nov 25, 2011 | past | 1 comment
|
| | 3DES protected smartcard cracked with side channel analysis. (ruhr-uni-bochum.de) |
|
28 points by ryanmolden on Nov 16, 2011 | past | 11 comments
|
| | Massive security flaws at Amazon Web Services discovered and remedied (ruhr-uni-bochum.de) |
|
1 point by taylorbuley on Oct 26, 2011 | past
|
| | XML Encryption is insecure: Large companies affected (ruhr-uni-bochum.de) |
|
6 points by llambda on Oct 22, 2011 | past
|