Search for "374" returned 1967 results

In Search of Evidence-Based IT-Security
30 min

In Search of Evidence-Based IT-Security

IT security is largely a science-free field. This needs to…

Rebel Cities
33 min

Rebel Cities

Towards A Global Network Of Neighbourhoods And Cities…

Rowhammer.js: Root privileges for web apps?
30 min

Rowhammer.js: Root privileges for web apps?

A tale of fault attacks on DRAM and attacks on CPU caches

apertus° AXIOM
30 min

apertus° AXIOM

The first Open Source Cinema Camera

Do You Think That's Funny?
54 min

Do You Think That's Funny?

Art Practice under the Regime of Anti-Terror Legislation

The foodsaving grassroots movement
37 min

The foodsaving grassroots movement

How cooperative online structures can facilitate…

Uncertain Concern
58 min

Uncertain Concern

How Undocumented Immigrants in the US Navigate Technology

Deep Learning Blindspots
53 min

Deep Learning Blindspots

Tools for Fooling the "Black Box"

Reverse engineering FPGAs
42 min

Reverse engineering FPGAs

Dissecting FPGAs from bottom up, extracting schematics and…

Netzpolitik in der Schweiz 2016
62 min

Netzpolitik in der Schweiz 2016

Grundrechte per Volksentscheid versenken

Intercoms Hacking
40 min

Intercoms Hacking

Call the frontdoor to install your backdoors

What could possibly go wrong with <insert x86 instruction here>?
55 min

What could possibly go wrong with <insert x86 instruction here>?

Side effects include side-channel attacks and bypassing…

Understanding the Snooper’s Charter
36 min

Understanding the Snooper’s Charter

Theresa May’s effort to abolish privacy

Wheel of Fortune
36 min

Wheel of Fortune

Analyzing Embedded OS Random Number Generators

Snowden Effect vs. Privacy Paradox
34 min

Snowden Effect vs. Privacy Paradox

Einstellungen und Internetnutzungsverhalten im Kontext des…

Nerds in the news
31 min

Nerds in the news

Spending a year coding in a newsroom