Search for "Udo Vetter" returned 1111 results

BLUFFS: Bluetooth Forward and Future Secrecy Attacks and Defenses
59 min

BLUFFS: Bluetooth Forward and Future Secrecy Attacks and Defenses

Breaking and fixing the Bluetooth standard. One More Time.

The Universe Is, Like, Seriously Huge
32 min

The Universe Is, Like, Seriously Huge

Stuff in Space Is Far Away – but How Do We Know?

Interplanetary Colonization
33 min

Interplanetary Colonization

the state at the beginning of the 21st Century

SCADA - Gateway to (s)hell
45 min

SCADA - Gateway to (s)hell

Hacking industrial control gateways

Beyond Anti Evil Maid
60 min

Beyond Anti Evil Maid

Making it easier to avoid low-level compromise, and why…

When hardware must „just work“
58 min

When hardware must „just work“

An inside look at x86 CPU design

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

Disclosure DOs, Disclosure DON'Ts
44 min

Disclosure DOs, Disclosure DON'Ts

Pragmatic Advice for Security Researchers

Turing Complete User
33 min

Turing Complete User

What can be done to protect the term, the notion and the…

Boeing 737MAX: Automated Crashes
60 min

Boeing 737MAX: Automated Crashes

Underestimating the dangers of designing a protection system

Reverse engineering FPGAs
42 min

Reverse engineering FPGAs

Dissecting FPGAs from bottom up, extracting schematics and…

goto fail;
63 min

goto fail;

exploring two decades of transport layer insecurity

Long war tactics
28 min

Long war tactics

or how we learned to stop worrying and love the NSA

Corporate surveillance, digital tracking, big data & privacy
62 min

Corporate surveillance, digital tracking, big data & privacy

How thousands of companies are profiling, categorizing,…

Do You Think That's Funny?
54 min

Do You Think That's Funny?

Art Practice under the Regime of Anti-Terror Legislation

Corona-Warn-App
41 min

Corona-Warn-App

Behind the scenes: Invisible, yet important

Attacking end-to-end email encryption
60 min

Attacking end-to-end email encryption

Efail, other attacks and lessons learned.