Search for "15" returned 4787 results

Triggering Deep Vulnerabilities Using Symbolic Execution
45 min

Triggering Deep Vulnerabilities Using Symbolic Execution

Deep program analysis without the headache

Revisiting SSL/TLS Implementations
55 min

Revisiting SSL/TLS Implementations

New Bleichenbacher Side Channels and Attacks

Damn Vulnerable Chemical Process
61 min

Damn Vulnerable Chemical Process

Exploitation in a new media

Fooled by the Website Carbon Calculator
19 min

Fooled by the Website Carbon Calculator

Green Coding & Measuring the Environmental Impacts of IT

SearchWing
45 min

SearchWing

Open source drones for Search & Rescue

No Love for the US Gov.
53 min

No Love for the US Gov.

Why Lauri Love’s case is even more important than you…

The Time is Right
95 min

The Time is Right

Ein Science-Fiction-Theaterstück

AMD x86 SMU firmware analysis
54 min

AMD x86 SMU firmware analysis

Do you care about Matroshka processors?

ZombieLoad Attack
55 min

ZombieLoad Attack

Leaking Your Recent Memory Operations on Intel CPUs

Rock' em Graphic Cards
56 min

Rock' em Graphic Cards

Introduction to Heterogeneous Parallel Programming

Visiting The Bear Den
59 min

Visiting The Bear Den

A Journey in the Land of (Cyber-)Espionage

Graphs, Drones & Phones
55 min

Graphs, Drones & Phones

The role of social-graphs for Drones in the War on Terror.

Holography of Wi-Fi radiation
61 min

Holography of Wi-Fi radiation

Can we see the stray radiation of wireless devices? And…