Search for "Arne" returned 4196 results

What could possibly go wrong with <insert x86 instruction here>?
55 min

What could possibly go wrong with <insert x86 instruction here>?

Side effects include side-channel attacks and bypassing…

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

Data Mining for Good
26 min

Data Mining for Good

Using random sampling, entity resolution, communications…

Hacking EU funding for a decentralizing FOSS project
59 min

Hacking EU funding for a decentralizing FOSS project

Understanding and adapting EU legal guidelines from a FOSS…

A short political history of acoustics
49 min

A short political history of acoustics

For whom, and to do what, the science of sound was…

Android DDI
47 min

Android DDI

Dynamic Dalvik Instrumentation of Android Applications and…

Ceph, ELK &amp; opensuse
20 min

Ceph, ELK & opensuse

This talk will be held by Denys Kondratenko and Abhishek…

IT-Sicherheit für Verbraucher stärken
38 min

IT-Sicherheit für Verbraucher stärken

Entwicklung eines IT-Sicherheitsbewertungssystems für…

Gone in 60 Milliseconds
33 min

Gone in 60 Milliseconds

Intrusion and Exfiltration in Server-less Architectures

Implementing flexible page layouts with Drupal
69 min

Implementing flexible page layouts with Drupal

Using the PHPTemplate engine and the Content Construction…

Open source is just about the source, isn&#39;t it?
55 min

Open source is just about the source, isn't it?

Stuff your open source project needs to care about that…

The Gospel of IRMA
55 min

The Gospel of IRMA

Attribute Based Credentials in Practice

Our daily job: hacking the law
55 min

Our daily job: hacking the law

The key elements of policy hacking

Unpatchable
60 min

Unpatchable

Living with a vulnerable implanted device

Understanding buffer overflow exploitation
59 min

Understanding buffer overflow exploitation

The fascinating interplay of CPU, stack, C-compiler and…