Search for "Hugo" returned 746 results

Triggering Deep Vulnerabilities Using Symbolic Execution
45 min

Triggering Deep Vulnerabilities Using Symbolic Execution

Deep program analysis without the headache

Provable Security
59 min

Provable Security

How I learned to stop worrying and love the backdoor

LabIX
43 min

LabIX

Creating an Internet Exchange in your local Hackerspace

Free Electron Lasers
59 min

Free Electron Lasers

...or why we need 17 billion Volts to make a picture.

Key-logger, Video, Mouse
49 min

Key-logger, Video, Mouse

How to turn your KVM into a raging key-logging monster

Trust us and our business will expand!
22 min

Trust us and our business will expand!

Net-activism strategies against fake web companies

Switches Get Stitches
58 min

Switches Get Stitches

Industrial System Ownership

Extracting keys from FPGAs, OTP Tokens and Door Locks
41 min

Extracting keys from FPGAs, OTP Tokens and Door Locks

Side-Channel (and other) Attacks in Practice

Seidenstraße
48 min

Seidenstraße

The Making of…

Don't stop 'til you feel it
63 min

Don't stop 'til you feel it

Artistic interventions in climate change

WarGames in memory
56 min

WarGames in memory

what is the winning move?