Search for "Jella" returned 85 results

Lockpicking in the IoT
60 min

Lockpicking in the IoT

...or why adding BTLE to a device sometimes isn't smart at…

Hebocon
50 min

Hebocon

The sumo robot fight for the technically ungifted

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

How to Break PDFs
58 min

How to Break PDFs

Breaking PDF Encryption and PDF Signatures

Lifting the Fog on Red Star OS
60 min

Lifting the Fog on Red Star OS

A deep dive into the surveillance features of North Korea's…

SELECT code_execution FROM * USING SQLite;
46 min

SELECT code_execution FROM * USING SQLite;

--Gaining code execution using a malicious SQLite database

Hacking (with) a TPM
37 min

Hacking (with) a TPM

Don't ask what you can do for TPMs, Ask what TPMs can do…

Mein Bot, der Kombattant
60 min

Mein Bot, der Kombattant

Operative Kommunikation im digitalen Informationskrieg

Psychedelic Medicine - Hacking Psychiatry?!
40 min

Psychedelic Medicine - Hacking Psychiatry?!

Psychedelic Therapy as a fundamentally new approach to…