Search for "29" returned 4232 results

TrustZone is not enough
31 min

TrustZone is not enough

Hijacking debug components for embedded security

Triggering Deep Vulnerabilities Using Symbolic Execution
45 min

Triggering Deep Vulnerabilities Using Symbolic Execution

Deep program analysis without the headache

Ten years after ‚We Lost The War‘
61 min

Ten years after ‚We Lost The War‘

The future does not look much brighter than ten years ago.…

Don't stop 'til you feel it
63 min

Don't stop 'til you feel it

Artistic interventions in climate change

AMD x86 SMU firmware analysis
54 min

AMD x86 SMU firmware analysis

Do you care about Matroshka processors?

Quantum Computing: Are we there yet?
61 min

Quantum Computing: Are we there yet?

An introduction to quantum computing and a review of the…

No Love for the US Gov.
53 min

No Love for the US Gov.

Why Lauri Love’s case is even more important than you…

Self-encrypting deception
58 min

Self-encrypting deception

weaknesses in the encryption of solid state drives (SSDs)

Ich sehe, also bin ich ... Du
60 min

Ich sehe, also bin ich ... Du

Gefahren von Kameras für (biometrische)…

Keine Anhaltspunkte für flächendeckende Überwachung
66 min

Keine Anhaltspunkte für flächendeckende Überwachung

Die Diskussion um NSA, PRISM, Tempora sprachlich und…

Bionic Ears
62 min

Bionic Ears

Introduction into State-of-the-Art Hearing Aid Technology

Freedom needs fighters!
60 min

Freedom needs fighters!

Wie die GFF mit strategischen Klagen für Freiheitsrechte…