Search for "851" returned 1867 results

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

Transhuman Expression
62 min

Transhuman Expression

Interdisciplinary research in Painting and Robotics. with…

To Protect And Infect, Part 2
62 min

To Protect And Infect, Part 2

The militarization of the Internet

Provable Security
59 min

Provable Security

How I learned to stop worrying and love the backdoor

Theater und Quantenzeitalter
57 min

Theater und Quantenzeitalter

„Die Parallelwelt“- Das Schauspiel Dortmund und die…

"Fluxus cannot save the world."
57 min

"Fluxus cannot save the world."

What hacking has to do with avantgarde art of the 1960ies…

Enclosure-PUF
61 min

Enclosure-PUF

Tamper Proofing Commodity Hardware and other Applications

PLC-Blaster
58 min

PLC-Blaster

Ein Computerwurm für PLCs

Android DDI
47 min

Android DDI

Dynamic Dalvik Instrumentation of Android Applications and…

Console Hacking
72 min

Console Hacking

Breaking the 3DS

Safe and Secure Drivers in High-Level Languages
61 min

Safe and Secure Drivers in High-Level Languages

How to write PCIe drivers in Rust, go, C#, Swift, Haskell,…