Search for "11" returned 4577 results

Web-based Cryptojacking in the Wild
39 min

Web-based Cryptojacking in the Wild

When your browser is mining coins for other people

RFID Treehouse of Horror
58 min

RFID Treehouse of Horror

Hacking City-Wide Access Control Systems

A world without blockchain
42 min

A world without blockchain

How (inter)national money transfers works

Triggering Deep Vulnerabilities Using Symbolic Execution
45 min

Triggering Deep Vulnerabilities Using Symbolic Execution

Deep program analysis without the headache

Ten years after ‚We Lost The War‘
61 min

Ten years after ‚We Lost The War‘

The future does not look much brighter than ten years ago.…

„Nach bestem Wissen und Gewissen“ – Floskeln in der Politik
60 min

„Nach bestem Wissen und Gewissen“ – Floskeln in der Politik

Politische Phrasologie – warum man aus dem ganzen Zeug, das…

Ich sehe, also bin ich ... Du
60 min

Ich sehe, also bin ich ... Du

Gefahren von Kameras für (biometrische)…

No Love for the US Gov.
53 min

No Love for the US Gov.

Why Lauri Love’s case is even more important than you…

avatar²
55 min

avatar²

Towards an open source binary firmware analysis framework

Quantum Computing: Are we there yet?
61 min

Quantum Computing: Are we there yet?

An introduction to quantum computing and a review of the…

AMD x86 SMU firmware analysis
54 min

AMD x86 SMU firmware analysis

Do you care about Matroshka processors?

Keine Anhaltspunkte für flächendeckende Überwachung
66 min

Keine Anhaltspunkte für flächendeckende Überwachung

Die Diskussion um NSA, PRISM, Tempora sprachlich und…

Self-encrypting deception
58 min

Self-encrypting deception

weaknesses in the encryption of solid state drives (SSDs)