Search for "Hugo" returned 746 results

45 min
Triggering Deep Vulnerabilities Using Symbolic Execution
Deep program analysis without the headache

59 min
Provable Security
How I learned to stop worrying and love the backdoor

59 min
Fernvale: An Open Hardware and Software Platform, Based on the (nominally) Closed-Source…
A Lawful Method for Converting Closed IP into Open IP

59 min
Free Electron Lasers
...or why we need 17 billion Volts to make a picture.

49 min
Key-logger, Video, Mouse
How to turn your KVM into a raging key-logging monster

22 min
Trust us and our business will expand!
Net-activism strategies against fake web companies

58 min
Switches Get Stitches
Industrial System Ownership

41 min
Extracting keys from FPGAs, OTP Tokens and Door Locks
Side-Channel (and other) Attacks in Practice

48 min
Seidenstraße
The Making of…

63 min
Don't stop 'til you feel it
Artistic interventions in climate change

59 min
Towards General Purpose Reconfigurable Computing on Novena
FPGAs for Everybody with Novena

56 min