Search for "Andi Rüther" returned 676 results

Jailbreaking iOS
47 min

Jailbreaking iOS

From past to present

SCADA - Gateway to (s)hell
45 min

SCADA - Gateway to (s)hell

Hacking industrial control gateways

The Gospel of IRMA
55 min

The Gospel of IRMA

Attribute Based Credentials in Practice

Practical Mix Network Design
46 min

Practical Mix Network Design

Strong metadata protection for asynchronous messaging

Rowhammer.js: Root privileges for web apps?
30 min

Rowhammer.js: Root privileges for web apps?

A tale of fault attacks on DRAM and attacks on CPU caches

In Search of Evidence-Based IT-Security
30 min

In Search of Evidence-Based IT-Security

IT security is largely a science-free field. This needs to…

Information Control and Strategic Violence
30 min

Information Control and Strategic Violence

How governments use censorship and surveillance as part of…

BREACH in Agda
49 min

BREACH in Agda

Security notions, proofs and attacks using dependently…

Blinkenrocket!
29 min

Blinkenrocket!

How to make a community project fly

Extracting keys from FPGAs, OTP Tokens and Door Locks
41 min

Extracting keys from FPGAs, OTP Tokens and Door Locks

Side-Channel (and other) Attacks in Practice

Electronic Evicence in Criminal Matters
46 min

Electronic Evicence in Criminal Matters

An introduction and critique of the EC proposal for a…

Computer Science in the DPRK
33 min

Computer Science in the DPRK

A view into technology on the other side of the world

Interplanetary Colonization
33 min

Interplanetary Colonization

the state at the beginning of the 21st Century

osmo-gmr: What's up with sat-phones ?
60 min

osmo-gmr: What's up with sat-phones ?

Piecing together the missing bits