Search for "Jim" returned 5093 results

Open Source in the WSN Research
51 min

Open Source in the WSN Research

Experiences made with free and open source software in…

avatar²
55 min

avatar²

Towards an open source binary firmware analysis framework

RFID Treehouse of Horror
58 min

RFID Treehouse of Horror

Hacking City-Wide Access Control Systems

Building a high throughput low-latency PCIe based SDR
60 min

Building a high throughput low-latency PCIe based SDR

Lessons learnt implementing PCIe on FPGA for XTRX Software…

Technology and Mass Atrocity Prevention
32 min

Technology and Mass Atrocity Prevention

Overview on Current Efforts - We Need Moar H4x0rs?!

OPENCOIL – A Roaming Speedshow
87 min

OPENCOIL – A Roaming Speedshow

or the fine art of appropriating inductive charging pads in…

Interplanetary Colonization
33 min

Interplanetary Colonization

the state at the beginning of the 21st Century

Harry Potter and the Not-So-Smart Proxy War
35 min

Harry Potter and the Not-So-Smart Proxy War

Taking a look at a covert CIA virtual fencing solution

Boeing 737MAX: Automated Crashes
60 min

Boeing 737MAX: Automated Crashes

Underestimating the dangers of designing a protection system

Wifibroadcast
42 min

Wifibroadcast

How to convert standard wifi dongles into digital broadcast…

The foodsaving grassroots movement
37 min

The foodsaving grassroots movement

How cooperative online structures can facilitate…

What could possibly go wrong with <insert x86 instruction here>?
55 min

What could possibly go wrong with <insert x86 instruction here>?

Side effects include side-channel attacks and bypassing…

Why do we need an open food information platform
39 min

Why do we need an open food information platform

We want all data about food to be linked and public

This is NOT a proposal about mass surveillance!
43 min

This is NOT a proposal about mass surveillance!

Analysing the terminology of the UK’s Snooper’s Charter

Why is GPG &quot;damn near unusable&quot;?
60 min

Why is GPG "damn near unusable"?

An overview of usable security research

Switches Get Stitches
58 min

Switches Get Stitches

Industrial System Ownership