Uncovering Software Provenance in Embedded Systems - Ricardo Mendoza, Pantacor
BoF: Challenges of Low Spec Embedded Linux - Alexander Sack, Pantacor Ltd.
Quant dev candidate REALLY understands smart pointers #coding #quant
CCoE Webinar Series: Using the Blockchain to Secure Provenance Meta Data
Complecting Made Easy - Tony Van Eerd [CppNow 2021]
USENIX Security '20 - From Control Model to Program: Investigating Robotic Aerial Vehicle Accidents
AI Frontiers: Cutting-Edge Computer Security Research (2025-05-22)
[POPL'23] CN: Verifying Systems C Code with Separation-Logic Refinement Types
10 Minute Tip: Browser Developer Tools
Generative vs Agentic AI: Shaping the Future of AI Collaboration
Fortscale Use Case #1 - Suspected Data Exfiltration
GraphRAG vs. Traditional RAG: Higher Accuracy & Insight with LLM
Emanate Like A Boss: Generalized Covert Data Exfiltration With Funtenna
Demo of the Opuntia project
1 Analysis of Shortest Path Routing for Larg Multi Hop Wirless Networks
Lightning Talk: Quickly Estimating Powers-Of-Two in Your Head - Andreas Weis - CppCon 2021
NDSS 2021 Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Tests
Juliana Freire - Reproducible Research Workshop 2011
CERIAS Seminar: Security Applications for Physically Unclonable Functions
🧨 DANCING ON A POWDER KEG WITH CHINA! Trump handed Odesa to Putin. NABU moves in on Zelensky.