Search for "374" returned 1991 results
54 min
How (not) to build autonomous robots
Fables from building a startup in Silicon Valley
61 min
Verhalten bei Hausdurchsuchungen
Praktische Hinweise für den Kontakt mit der Staatsmacht
60 min
Build your own NSA
How private companies leak your personal data into the…
42 min
A world without blockchain
How (inter)national money transfers works
45 min
Triggering Deep Vulnerabilities Using Symbolic Execution
Deep program analysis without the headache
48 min
REXUS/BEXUS - Rocket and Balloon Experiments for University Students
How to bring student experiments into space.
70 min
Security Nightmares 0x14
Was Sie schon immer nicht über darüber wissen wollten wer…
58 min
Wie klimafreundlich ist Software?
Einblicke in die Forschung und Ausblick in die…
46 min
Electronic Evicence in Criminal Matters
An introduction and critique of the EC proposal for a…
51 min
Virtual Secure Boot
Secure Boot support in qemu, kvm and ovmf.
63 min
A look into the Mobile Messaging Black Box
A gentle introduction to mobile messaging and subsequent…
41 min
Extracting keys from FPGAs, OTP Tokens and Door Locks
Side-Channel (and other) Attacks in Practice
58 min
Switches Get Stitches
Industrial System Ownership
49 min