Search for "374" returned 1964 results

Forging the USB armory
30 min

Forging the USB armory

Creating an open source secure flash-drive-sized computer

Security Nightmares 0x14
70 min

Security Nightmares 0x14

Was Sie schon immer nicht über darüber wissen wollten wer…

How risky is the software you use?
58 min

How risky is the software you use?

CITL: Quantitative, Comparable Software Risk Reporting

Electronic Evicence in Criminal Matters
46 min

Electronic Evicence in Criminal Matters

An introduction and critique of the EC proposal for a…

Virtual Secure Boot
51 min

Virtual Secure Boot

Secure Boot support in qemu, kvm and ovmf.

A look into the Mobile Messaging Black Box
63 min

A look into the Mobile Messaging Black Box

A gentle introduction to mobile messaging and subsequent…

Dissecting VoLTE
49 min

Dissecting VoLTE

Exploiting Free Data Channels and Security Problems

Extracting keys from FPGAs, OTP Tokens and Door Locks
41 min

Extracting keys from FPGAs, OTP Tokens and Door Locks

Side-Channel (and other) Attacks in Practice

Switches Get Stitches
58 min

Switches Get Stitches

Industrial System Ownership

How Alice and Bob meet if they don't like onions
61 min

How Alice and Bob meet if they don't like onions

Survey of Network Anonymisation Techniques

3D printing on the moon
55 min

3D printing on the moon

The future of space exploration