Search for "Sven Brauch" returned 183 results

Glitching For n00bs
58 min

Glitching For n00bs

A Journey to Coax Out Chips' Inner Secrets

On Digitalisation, Sustainability & Climate Justice
60 min

On Digitalisation, Sustainability & Climate Justice

A critical talk about sustainability, technology, society,…

Funkzellenabfrage: Die alltägliche Rasterfahndung unserer Handydaten
58 min

Funkzellenabfrage: Die alltägliche Rasterfahndung unserer Handydaten

Wie wir alle regelmäßig den Behörden ins Netz gehen und wie…

Graphs, Drones & Phones
55 min

Graphs, Drones & Phones

The role of social-graphs for Drones in the War on Terror.

Intel Management Engine deep dive
60 min

Intel Management Engine deep dive

Understanding the ME at the OS and hardware level

Protecting the Wild
57 min

Protecting the Wild

Conservation Genomics between Taxonomy, Big Data,…

The Clash of Digitalizations
31 min

The Clash of Digitalizations

The Devolution of Arab Men from Humans to Digital Fodder

Baseband Exploitation in 2013
58 min

Baseband Exploitation in 2013

Hexagon challenges

Deploying TLS 1.3: the great, the good and the bad
61 min

Deploying TLS 1.3: the great, the good and the bad

Improving the encrypted the web, one round-trip at a time

Viva la Vita Vida
56 min

Viva la Vita Vida

Hacking the most secure handheld console

Welche Sprache sprechen Satelliten?
21 min

Welche Sprache sprechen Satelliten?

Ein Überblick über Protokolle und verwendete…

Ecocide and (green) colonialism in Sápmi
42 min

Ecocide and (green) colonialism in Sápmi

Data centers on indigenous land in Northern Europe

ZombieLoad Attack
55 min

ZombieLoad Attack

Leaking Your Recent Memory Operations on Intel CPUs

Drones
60 min

Drones

Autonomous flying vehicles, where are we and where are we…

When hardware must „just work“
58 min

When hardware must „just work“

An inside look at x86 CPU design

WTF DJI, UAV CTF?!
43 min

WTF DJI, UAV CTF?!

A hacker's view at commercial drone security

CAESAR and NORX
61 min

CAESAR and NORX

Developing the Future of Authenticated Encryption