Search for "12" returned 5141 results

Connected Mobility hacken: digital.bike.23
50 min

Connected Mobility hacken: digital.bike.23

Von E-Bikes in der Connected Mobility zur Entstehung eines…

The DROWN Attack
55 min

The DROWN Attack

Breaking TLS using SSLv2

The Zcash anonymous cryptocurrency
31 min

The Zcash anonymous cryptocurrency

or zero-knowledge succinct non-interactive arguments of…

Building and Breaking Wireless Security
29 min

Building and Breaking Wireless Security

Wireless Physical Layer Security & More...

Code BROWN in the Air
37 min

Code BROWN in the Air

A systemic update of sensitive information that you sniff…

Disclosure DOs, Disclosure DON'Ts
44 min

Disclosure DOs, Disclosure DON'Ts

Pragmatic Advice for Security Researchers

Bug class genocide
47 min

Bug class genocide

Applying science to eliminate 100% of buffer overflows

ASLR on the line
44 min

ASLR on the line

Practical cache attacks on the MMU

Coding your body
32 min

Coding your body

How to decipher the messages of your body

Das nützlich-unbedenklich Spektrum
63 min

Das nützlich-unbedenklich Spektrum

Können wir Software bauen, die nützlich /und/ unbedenklich…

Eye Wear Computing
32 min

Eye Wear Computing

Augmenting the Human Mind