Search for "Andi Rüther" returned 676 results

47 min
Jailbreaking iOS
From past to present

45 min
SCADA - Gateway to (s)hell
Hacking industrial control gateways

55 min
The Gospel of IRMA
Attribute Based Credentials in Practice

46 min
Practical Mix Network Design
Strong metadata protection for asynchronous messaging

30 min
Rowhammer.js: Root privileges for web apps?
A tale of fault attacks on DRAM and attacks on CPU caches

30 min
In Search of Evidence-Based IT-Security
IT security is largely a science-free field. This needs to…

30 min
Information Control and Strategic Violence
How governments use censorship and surveillance as part of…

49 min
BREACH in Agda
Security notions, proofs and attacks using dependently…

40 min
No roborders, no nation, or: smile for a European surveillance propagation
How an agency implements Fortress Europe by degrading…

29 min
Blinkenrocket!
How to make a community project fly

41 min
Extracting keys from FPGAs, OTP Tokens and Door Locks
Side-Channel (and other) Attacks in Practice

46 min
Electronic Evicence in Criminal Matters
An introduction and critique of the EC proposal for a…

33 min
Computer Science in the DPRK
A view into technology on the other side of the world

33 min
Interplanetary Colonization
the state at the beginning of the 21st Century

43 min
How Facebook tracks you on Android
(even if you don’t have a Facebook account)

59 min
Memory Deduplication: The Curse that Keeps on Giving
A tale of 3 different memory deduplication based…

60 min