Search for "Eva" returned 531 results

37C3 Infrastructure Review
71 min

37C3 Infrastructure Review

Teams presenting how they helped making this awesome event

SigOver + alpha
55 min

SigOver + alpha

Signal overshadowing attack on LTE and its applications

How risky is the software you use?
58 min

How risky is the software you use?

CITL: Quantitative, Comparable Software Risk Reporting

Mit Kunst die Gesellschaft hacken
67 min

Mit Kunst die Gesellschaft hacken

Das Zentrum für politische Schönheit

Visiting The Bear Den
59 min

Visiting The Bear Den

A Journey in the Land of (Cyber-)Espionage

The Time is Right
95 min

The Time is Right

Ein Science-Fiction-Theaterstück

Revisiting SSL/TLS Implementations
55 min

Revisiting SSL/TLS Implementations

New Bleichenbacher Side Channels and Attacks

The GNU Name System
51 min

The GNU Name System

A Decentralized PKI For Social Movements

Das nützlich-unbedenklich Spektrum
63 min

Das nützlich-unbedenklich Spektrum

Können wir Software bauen, die nützlich /und/ unbedenklich…

Decoding the LoRa PHY
64 min

Decoding the LoRa PHY

Dissecting a Modern Wireless Network for the Internet of…

Taking a scalpel to QNX
46 min

Taking a scalpel to QNX

Analyzing & Breaking Exploit Mitigations and Secure Random…

Household, Totalitarianism and Cyberspace
56 min

Household, Totalitarianism and Cyberspace

Philosophical Perspectives on Privacy Drawing on the…

Unpatchable
60 min

Unpatchable

Living with a vulnerable implanted device

The Matter of Heartbleed
50 min

The Matter of Heartbleed

What went wrong, how the Internet reacted, what we can…

Operation Triangulation
58 min

Operation Triangulation

What You Get When Attack iPhones of Researchers