Search for "629" returned 1976 results

Triggering Deep Vulnerabilities Using Symbolic Execution
45 min

Triggering Deep Vulnerabilities Using Symbolic Execution

Deep program analysis without the headache

Public Library/Memory of the World
62 min

Public Library/Memory of the World

Access to knowledge for every member of society

So you want to build a satellite?
60 min

So you want to build a satellite?

How hard can it be? An introduction into CubeSat development

Copywrongs 2.0
61 min

Copywrongs 2.0

We must prevent EU copyright reform from breaking the…

Correcting copywrongs
61 min

Correcting copywrongs

European copyright reform is finally on the horizon

An Elevator to the Moon (and back)
61 min

An Elevator to the Moon (and back)

Space Transportation and the Extraterrestrial Imperative

Building Custom Pinball Machines
63 min

Building Custom Pinball Machines

What you need and how it works. An experiences report

Trustworthy secure modular operating system engineering
61 min

Trustworthy secure modular operating system engineering

fun(ctional) operating system and security protocol…

25 Jahre Chipkarten-Angriffe
61 min

25 Jahre Chipkarten-Angriffe

Von der Historie zur Zukunft

Das Zahnrad aus Fleisch
60 min

Das Zahnrad aus Fleisch

Expeditionen ins Kommentierreich

Hacking (with) a TPM
37 min

Hacking (with) a TPM

Don't ask what you can do for TPMs, Ask what TPMs can do…

institutions for Resolution Disputes
33 min

institutions for Resolution Disputes

Rosa Menkman investigates video compression, feedback, and…

Schnaps Hacking
38 min

Schnaps Hacking

from apple to schnaps -- a complete diy-toolchain