Media Summary: Extracting a secret key by simply watching the flickering of an Denial of service usually relies on a flood of data. Slow Loris takes a more elegant approach, and almost bores a server to death. Spectre refers to a whole family of potential weaknesses of which Meltdown is just one. Dr Steve Bagley talks about CPU ...

Power Led Attack Computerphile - Detailed Analysis & Overview

Extracting a secret key by simply watching the flickering of an Denial of service usually relies on a flood of data. Slow Loris takes a more elegant approach, and almost bores a server to death. Spectre refers to a whole family of potential weaknesses of which Meltdown is just one. Dr Steve Bagley talks about CPU ... An oldie but a goodie, Dr Mike Pound revisits the Log-Jam How do we measure harm to improve the performance of Ai in the real world? Dr Hana Chockler is a Reader in Computer Science ... The number of virtual machines has swelled due to cloud computing & changes to the X86 processor, but what are Virtual ...

Steve gets all festive and tries to improve on the festive lights he built a mere 11 years ago... Dr Steve Bagley is based at the ... The back door that may not be a back door... The suspicion about Dual_EC_DRBG - The Dual Elliptic Curve Deterministic ... How does instant messaging encryption protect against You can't beat physics. Why the chip manufacturers are heading for a wall. We asked nano-scientist Phil Moriarty Professor of ... RISC processors kept things simple, but when do you need to make your hardware more complicated and when can you leave it ... Once you've pressed a key on the keyboard and the signal gets to the computer, what happens next? Dr Steve Bagley on the ...

Professor Brailsford returns to the subject of why Colossus was built. The professor's notes: ... The 'secure' TETRA communications system has been used by police and security services for decades, it's been revealed that ... The PDP1 was a groundbreaking computer from the 1950's - but where does it fit into computing history and how would you use it ...

Photo Gallery

Power LED Attack - Computerphile
The Attack That Could Disrupt The Whole Internet - Computerphile
Slow Loris Attack - Computerphile
Spectre & Meltdown - Computerphile
LogJam Attack - Computerphile
Defining Harm for Ai Systems - Computerphile
Virtual Machines Power the Cloud - Computerphile
The Return of Festive Flashing Lights - Computerphile
Elliptic Curve Back Door - Computerphile
Double Ratchet Messaging Encryption - Computerphile
Physics of Computer Chips - Computerphile
Hardware vs Software & Digital Video - Computerphile
View Detailed Profile
Power LED Attack - Computerphile

Power LED Attack - Computerphile

Extracting a secret key by simply watching the flickering of an

The Attack That Could Disrupt The Whole Internet - Computerphile

The Attack That Could Disrupt The Whole Internet - Computerphile

Audible free book: http://www.audible.com/

Slow Loris Attack - Computerphile

Slow Loris Attack - Computerphile

Denial of service usually relies on a flood of data. Slow Loris takes a more elegant approach, and almost bores a server to death.

Spectre & Meltdown - Computerphile

Spectre & Meltdown - Computerphile

Spectre refers to a whole family of potential weaknesses of which Meltdown is just one. Dr Steve Bagley talks about CPU ...

LogJam Attack - Computerphile

LogJam Attack - Computerphile

An oldie but a goodie, Dr Mike Pound revisits the Log-Jam

Defining Harm for Ai Systems - Computerphile

Defining Harm for Ai Systems - Computerphile

How do we measure harm to improve the performance of Ai in the real world? Dr Hana Chockler is a Reader in Computer Science ...

Virtual Machines Power the Cloud - Computerphile

Virtual Machines Power the Cloud - Computerphile

The number of virtual machines has swelled due to cloud computing & changes to the X86 processor, but what are Virtual ...

The Return of Festive Flashing Lights - Computerphile

The Return of Festive Flashing Lights - Computerphile

Steve gets all festive and tries to improve on the festive lights he built a mere 11 years ago... Dr Steve Bagley is based at the ...

Elliptic Curve Back Door - Computerphile

Elliptic Curve Back Door - Computerphile

The back door that may not be a back door... The suspicion about Dual_EC_DRBG - The Dual Elliptic Curve Deterministic ...

Double Ratchet Messaging Encryption - Computerphile

Double Ratchet Messaging Encryption - Computerphile

How does instant messaging encryption protect against

Physics of Computer Chips - Computerphile

Physics of Computer Chips - Computerphile

You can't beat physics. Why the chip manufacturers are heading for a wall. We asked nano-scientist Phil Moriarty Professor of ...

Hardware vs Software & Digital Video - Computerphile

Hardware vs Software & Digital Video - Computerphile

RISC processors kept things simple, but when do you need to make your hardware more complicated and when can you leave it ...

Mouse Pointers & Fitts's Law - Computerphile

Mouse Pointers & Fitts's Law - Computerphile

Audible free book: http://www.audible.com/

How Software Deals with Key Presses - Computerphile

How Software Deals with Key Presses - Computerphile

Once you've pressed a key on the keyboard and the signal gets to the computer, what happens next? Dr Steve Bagley on the ...

Exploiting the Tiltman Break - Computerphile

Exploiting the Tiltman Break - Computerphile

Professor Brailsford returns to the subject of why Colossus was built. The professor's notes: ...

TETRA Vulnerability (TETRA:BURST) - Computerphile

TETRA Vulnerability (TETRA:BURST) - Computerphile

The 'secure' TETRA communications system has been used by police and security services for decades, it's been revealed that ...

Hacking on the PDP1 Raspberry Pi Emulator - Computerphile

Hacking on the PDP1 Raspberry Pi Emulator - Computerphile

The PDP1 was a groundbreaking computer from the 1950's - but where does it fit into computing history and how would you use it ...