Search for "31" returned 4036 results

In Search of Evidence-Based IT-Security
30 min

In Search of Evidence-Based IT-Security

IT security is largely a science-free field. This needs to…

Methodisch inkorrekt!
113 min

Methodisch inkorrekt!

Die Wissenschaftsgala vom 33C3

library operating systems
32 min

library operating systems

reject the default reality^W abstractions and substitute…

Rowhammer.js: Root privileges for web apps?
30 min

Rowhammer.js: Root privileges for web apps?

A tale of fault attacks on DRAM and attacks on CPU caches

Briar
31 min

Briar

Resilient P2P Messaging for Everyone

Make the Internet Neutral Again
31 min

Make the Internet Neutral Again

Let's put the new EU Net Neutrality rules to work

Vehicle immobilization revisited
55 min

Vehicle immobilization revisited

Uncovering and assessing a second authentication mechanism…

Attacking Chrome IPC
54 min

Attacking Chrome IPC

Reliably finding bugs to escape the Chrome sandbox

Shut Up and Take My Money!
30 min

Shut Up and Take My Money!

The Red Pill of N26 Security