Search for "15" returned 4923 results

avatar²
55 min

avatar²

Towards an open source binary firmware analysis framework

Bionic Ears
62 min

Bionic Ears

Introduction into State-of-the-Art Hearing Aid Technology

Web-based Cryptojacking in the Wild
39 min

Web-based Cryptojacking in the Wild

When your browser is mining coins for other people

Freedom needs fighters!
60 min

Freedom needs fighters!

Wie die GFF mit strategischen Klagen für Freiheitsrechte…

Antipatterns und Missverständnisse in der Softwareentwicklung
33 min

Antipatterns und Missverständnisse in der Softwareentwicklung

Eine Geschichte voller Missverständnisse

Low Cost High Speed Photography
60 min

Low Cost High Speed Photography

Using microcontrollers to capture the blink of an eye for…

Triggering Deep Vulnerabilities Using Symbolic Execution
45 min

Triggering Deep Vulnerabilities Using Symbolic Execution

Deep program analysis without the headache

Revisiting SSL/TLS Implementations
55 min

Revisiting SSL/TLS Implementations

New Bleichenbacher Side Channels and Attacks

Damn Vulnerable Chemical Process
61 min

Damn Vulnerable Chemical Process

Exploitation in a new media

No Love for the US Gov.
53 min

No Love for the US Gov.

Why Lauri Love’s case is even more important than you…

The Time is Right
95 min

The Time is Right

Ein Science-Fiction-Theaterstück

AMD x86 SMU firmware analysis
54 min

AMD x86 SMU firmware analysis

Do you care about Matroshka processors?

ZombieLoad Attack
55 min

ZombieLoad Attack

Leaking Your Recent Memory Operations on Intel CPUs

Rock' em Graphic Cards
56 min

Rock' em Graphic Cards

Introduction to Heterogeneous Parallel Programming

Visiting The Bear Den
59 min

Visiting The Bear Den

A Journey in the Land of (Cyber-)Espionage

Graphs, Drones & Phones
55 min

Graphs, Drones & Phones

The role of social-graphs for Drones in the War on Terror.