Search for "566" returned 1922 results
70 min
Security Nightmares 0x14
Was Sie schon immer nicht über darüber wissen wollten wer…
58 min
Wie klimafreundlich ist Software?
Einblicke in die Forschung und Ausblick in die…
46 min
Electronic Evicence in Criminal Matters
An introduction and critique of the EC proposal for a…
51 min
Virtual Secure Boot
Secure Boot support in qemu, kvm and ovmf.
63 min
A look into the Mobile Messaging Black Box
A gentle introduction to mobile messaging and subsequent…
41 min
Extracting keys from FPGAs, OTP Tokens and Door Locks
Side-Channel (and other) Attacks in Practice
58 min
Switches Get Stitches
Industrial System Ownership
49 min
Dissecting VoLTE
Exploiting Free Data Channels and Security Problems
42 min
A world without blockchain
How (inter)national money transfers works
45 min
Triggering Deep Vulnerabilities Using Symbolic Execution
Deep program analysis without the headache
48 min
REXUS/BEXUS - Rocket and Balloon Experiments for University Students
How to bring student experiments into space.
33 min
Retail Surveillance / Retail Countersurveillance
50 most unwanted retail surveillance technologies / 50 most…
39 min
Web-based Cryptojacking in the Wild
When your browser is mining coins for other people
65 min
Mind-Hacking mit Psychedelika
Eine Einführung in die Wirkungsweise psychedelischer…
60 min
Build your own NSA
How private companies leak your personal data into the…
63 min