Search for ".yof" returned 7511 results

Fairtronics
38 min

Fairtronics

A Tool for Analyzing the Fairness of Electronic Devices

Leaving legacy behind
52 min

Leaving legacy behind

Reducing carbon footprint of network services with MirageOS…

Energy Harvesting for Smart Autonomous Electronics 2
81 min

Energy Harvesting for Smart Autonomous Electronics 2

Towards a future of autonomous wireless electronics without…

The movements against state-controlled Internet in Turkey
62 min

The movements against state-controlled Internet in Turkey

A short account of its history and future challenges

Hacking the universe
61 min

Hacking the universe

When strings are super and not made of characters

Dynamic Malware Analysis on Android Phones
44 min

Dynamic Malware Analysis on Android Phones

Presentation of the DyAnA Framework (Dynamic Android…

Hacking German Elections
63 min

Hacking German Elections

Insecure Electronic Vote Counting - How It Returned and Why…

Remote Attestation in MicroOS
35 min

Remote Attestation in MicroOS

Measuring the health of our system with a TPM

The Mars Rover On-board Computer
43 min

The Mars Rover On-board Computer

How Curiosity's Onboard Computer works, and what you can…

Delta Chat messenger
19 min

Delta Chat messenger

unlocking the potential of e-mail and the web

Introduction to (home) network security.
41 min

Introduction to (home) network security.

A beginner-friendly guide to network segmentation for…

Distributed Actor System with Rust
47 min

Distributed Actor System with Rust

Learn about the building blocks of a network application

Talking Behind Your Back
59 min

Talking Behind Your Back

On the Privacy & Security of the Ultrasound Tracking…

10GE monitoring live!
59 min

10GE monitoring live!

How to find that special one out of millions

Adventures in Mapping Afghanistan Elections
52 min

Adventures in Mapping Afghanistan Elections

The story of 3 Ushahidi mapping and reporting projects.

Code Pointer Integrity
61 min

Code Pointer Integrity

... or how we battle the daemons of memory safety

Crouching Powerpoint, Hidden Trojan
53 min

Crouching Powerpoint, Hidden Trojan

An analysis of targeted attacks from 2005 to 2007

The Privacy Workshop Project
48 min

The Privacy Workshop Project

Enhancing the value of privacy in todays students view

Eight rollouts a day keeping downtime away
53 min

Eight rollouts a day keeping downtime away

The philosophy of shared space in a development environment