Search for "875" returned 1851 results

Electronic Evicence in Criminal Matters
46 min

Electronic Evicence in Criminal Matters

An introduction and critique of the EC proposal for a…

Opening Closed Systems with GlitchKit
60 min

Opening Closed Systems with GlitchKit

'Liberating' Firmware from Closed Devices with Open Source…

Thwarting Evil Maid Attacks
58 min

Thwarting Evil Maid Attacks

Physically Unclonable Functions for Hardware Tamper…

Virtual Secure Boot
51 min

Virtual Secure Boot

Secure Boot support in qemu, kvm and ovmf.

Dissecting VoLTE
49 min

Dissecting VoLTE

Exploiting Free Data Channels and Security Problems

Extracting keys from FPGAs, OTP Tokens and Door Locks
41 min

Extracting keys from FPGAs, OTP Tokens and Door Locks

Side-Channel (and other) Attacks in Practice

CloudABI
62 min

CloudABI

Pure capability-based security for UNIX

What does Big Brother see, while he is watching?
60 min

What does Big Brother see, while he is watching?

Uncovering images from the secret Stasi archives.

Chaos Communication Slam
101 min

Chaos Communication Slam

Technische Liebesgedichte & Horrorgeschichten im…

Community
62 min

Community

Social Life & Life in the early 21st century

My Robot Will Crush You With Its Soft Delicate Hands!
60 min

My Robot Will Crush You With Its Soft Delicate Hands!

How to design and fabricate soft robots using everyday…

Buffered Daemons
31 min

Buffered Daemons

Sound art performance exploring the concept of translation…

Scholz greift durch: Die AfD wird verboten - Deepfakes auch!
43 min

Scholz greift durch: Die AfD wird verboten - Deepfakes auch!

Das Zentrum für politische Schönheit und der Flyerservice…

A Data Point Walks Into a Bar
32 min

A Data Point Walks Into a Bar

How cold data can make you feel things.

Bits and Bytes in Microgravity
39 min

Bits and Bytes in Microgravity

Insights into the hardware and software of sounding rockets

A world without blockchain
42 min

A world without blockchain

How (inter)national money transfers works

Triggering Deep Vulnerabilities Using Symbolic Execution
45 min

Triggering Deep Vulnerabilities Using Symbolic Execution

Deep program analysis without the headache