Search for "W. Heck" returned 1207 results

36 min
Accessible input for readers, coders, and hackers
From eyelid blinks to speech recognition

32 min
Craft, leisure, and end-user innovation
How hacking is conceived in social science research

58 min
When hardware must „just work“
An inside look at x86 CPU design

58 min
Baseband Exploitation in 2013
Hexagon challenges

36 min
Unlocking the Road Ahead: Automotive Digital Forensics
A deep dive into an underrepresented research area

55 min
What could possibly go wrong with <insert x86 instruction here>?
Side effects include side-channel attacks and bypassing…

55 min
ZombieLoad Attack
Leaking Your Recent Memory Operations on Intel CPUs

32 min
Coding your body
How to decipher the messages of your body

49 min
Electromagnetic Threats for Information Security
Ways to Chaos in Digital and Analogue Electronics

60 min
Lifting the Fog on Red Star OS
A deep dive into the surveillance features of North Korea's…

46 min
Public Money bei der Arbeit
die Deutsche Verwaltung und Open Source

47 min
Hardening hardware and choosing a #goodBIOS
Clean boot every boot - rejecting persistence of malicious…

55 min
Fuzzing the phone in the iPhone
D-d-d-di-di-d-d-di-d-di-d-di-d-dimm!

54 min
How medicine discovered sex
Introduction to sex- and gender-sensitive medicine

30 min
Rowhammer.js: Root privileges for web apps?
A tale of fault attacks on DRAM and attacks on CPU caches

58 min
Taming the Chaos: Can we build systems that actually work?
Possible paths from today's ghastly hackery to what…

61 min
Email authentication for penetration testers
When SPF is not enough

46 min
What The Fax?!
Hacking your network likes it's 1980 again

63 min