Search for "searchwing"

Boiling Mind
40 min

Boiling Mind

Analysing the link between audience physiology and…

Vehicle immobilization revisited
55 min

Vehicle immobilization revisited

Uncovering and assessing a second authentication mechanism…

Viva la Vita Vida
56 min

Viva la Vita Vida

Hacking the most secure handheld console

The Magic World of Searchable Symmetric Encryption
58 min

The Magic World of Searchable Symmetric Encryption

A brief introduction to search over encrypted data

Law Enforcement Are Hacking the Planet
31 min

Law Enforcement Are Hacking the Planet

How the FBI and local cops are hacking computers outside of…

Attribution revolution
55 min

Attribution revolution

Turning copyright upside-down with metadata

This is NOT a proposal about mass surveillance!
43 min

This is NOT a proposal about mass surveillance!

Analysing the terminology of the UK’s Snooper’s Charter

Protecting Your Privacy at the Border
58 min

Protecting Your Privacy at the Border

Traveling with Digital Devices in the Golden Age of…

Beyond your cable modem
60 min

Beyond your cable modem

How not to do DOCSIS networks

Der 33 Jahrerückblick
26 min

Der 33 Jahrerückblick

Technology and Politics in Congress Talks, from 1984 to now

Dissecting VoLTE
49 min

Dissecting VoLTE

Exploiting Free Data Channels and Security Problems

Drones
60 min

Drones

Autonomous flying vehicles, where are we and where are we…

In Search of Evidence-Based IT-Security
30 min

In Search of Evidence-Based IT-Security

IT security is largely a science-free field. This needs to…

SigOver + alpha
55 min

SigOver + alpha

Signal overshadowing attack on LTE and its applications

The Layman's Guide to Zero-Day Engineering
57 min

The Layman's Guide to Zero-Day Engineering

A demystification of the exploit development lifecycle