Search for "John" returned 1064 results
60 min
On the insecure nature of turbine control systems in power generation
A security study of turbine control systems in power…
53 min
Surveilling the surveillers
About military RF communication surveillance and other…
60 min
Building a high throughput low-latency PCIe based SDR
Lessons learnt implementing PCIe on FPGA for XTRX Software…
57 min
The Layman's Guide to Zero-Day Engineering
A demystification of the exploit development lifecycle
53 min
Console Hacking 2016
PS4: PC Master Race
41 min
NGI Zero: A treasure trove of IT innovation
Resilient. Trustworthy. Sustainably Open.
60 min
Attacking end-to-end email encryption
Efail, other attacks and lessons learned.
63 min
Reconstructing narratives
transparency in the service of justice
66 min
Mit, gegen oder jenseits von Politik?
Eine Reflexion über den paradoxen anarchistischen…
65 min
Rocket science – how hard can it be?
First steps into space with sounding rockets
63 min
Reproducible Builds
Moving Beyond Single Points of Failure for Software…
59 min
Let's build a quantum computer!
Understanding the architecture of a quantum processor
44 min
ASLR on the line
Practical cache attacks on the MMU
31 min
PUFs, protection, privacy, PRNGs
an overview of physically unclonable functions
60 min
Das Zahnrad aus Fleisch
Expeditionen ins Kommentierreich
60 min
Boeing 737MAX: Automated Crashes
Underestimating the dangers of designing a protection system
63 min