Search for "264" returned 2185 results

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

Security Nightmares 0x14
70 min

Security Nightmares 0x14

Was Sie schon immer nicht über darüber wissen wollten wer…

Ein Abgrund von Landesverrat
60 min

Ein Abgrund von Landesverrat

Wie es dazu kam und was daraus zu lernen ist

Electronic Evicence in Criminal Matters
46 min

Electronic Evicence in Criminal Matters

An introduction and critique of the EC proposal for a…

Virtual Secure Boot
51 min

Virtual Secure Boot

Secure Boot support in qemu, kvm and ovmf.

A look into the Mobile Messaging Black Box
63 min

A look into the Mobile Messaging Black Box

A gentle introduction to mobile messaging and subsequent…

Switches Get Stitches
58 min

Switches Get Stitches

Industrial System Ownership

Dissecting VoLTE
49 min

Dissecting VoLTE

Exploiting Free Data Channels and Security Problems

Boiling Mind
40 min

Boiling Mind

Analysing the link between audience physiology and…

Fairtronics
38 min

Fairtronics

A Tool for Analyzing the Fairness of Electronic Devices

Wallet Security
35 min

Wallet Security

How (not) to protect private keys

Low Cost Non-Invasive Biomedical Imaging
35 min

Low Cost Non-Invasive Biomedical Imaging

An Open Electrical Impedance Tomography Project

JODI - Apache is functioning normally
31 min

JODI - Apache is functioning normally

A net.art collective since 1995. Understanding the browser…