Search for "Andi Rüther" returned 708 results
62 min
To Protect And Infect, Part 2
The militarization of the Internet
64 min
Source Code and Cross-Domain Authorship Attribution
The Role of Stylometry in Privacy
42 min
A world without blockchain
How (inter)national money transfers works
61 min
Computational Meta-Psychology
An Artificial Intelligence exploration into the creation of…
59 min
Hardsploit: A Metasploit-like tool for hardware hacking
A complete toolbox for IoT security
56 min
Viva la Vita Vida
Hacking the most secure handheld console
58 min
When hardware must „just work“
An inside look at x86 CPU design
61 min
Deploying TLS 1.3: the great, the good and the bad
Improving the encrypted the web, one round-trip at a time
62 min
Bionic Ears
Introduction into State-of-the-Art Hearing Aid Technology
58 min
Self-encrypting deception
weaknesses in the encryption of solid state drives (SSDs)
58 min
Script Your Car!
Using existing hardware platforms to integrate python into…
60 min
Low Cost High Speed Photography
Using microcontrollers to capture the blink of an eye for…
61 min