Theme Selector
Filter by
No Results Found, Please Adjust Your Search
cryptography
Generalized Power Attacks against Crypto Hardware using Long-Range Deep Learning
CHES 2024
cryptography
A Hacker’s guide to reducing side-channel attack surfaces using deep-learning
Defcon & BH 2020
cryptography
A Hacker Guide To Deep Learning Based Side Channel Attacks
Defcon 2019
hacking
Attacking encrypted USB keys the hard(ware) way
Black Hat USA 2017
hacking
Bad beat: practical attacks against poker cheating devices
Mar 2017
hacking
Royal flush: an in-depth look at poker cheating devices accessories
Nov 2016
hacking
Full(er) House: Exposing high-end poker cheating devices
Oct 2016
hacking
Cheating at poker - James Bond Style
Defcon 2016
hacking
Does dropping usb drives really work?
Black Hat 2016
hacking
What are malicious usb keys and how to create a realistic one?
Aug 2016
hacking
Concerns about usb security are real: 48% of people do plug-in usb drives found in parking lots
Apr 2016
hacking
What tools do the fbi use when seizing computers or the curious case of the mouse jiggler device
Jan 2016
hacking
Embedded management interfaces emerging massive insecurity
Black Hat 2009