Search for "Mitch" returned 1191 results

In Search of Evidence-Based IT-Security
30 min

In Search of Evidence-Based IT-Security

IT security is largely a science-free field. This needs to…

Rowhammer.js: Root privileges for web apps?
30 min

Rowhammer.js: Root privileges for web apps?

A tale of fault attacks on DRAM and attacks on CPU caches

Information Control and Strategic Violence
30 min

Information Control and Strategic Violence

How governments use censorship and surveillance as part of…

A world without blockchain
42 min

A world without blockchain

How (inter)national money transfers works

Basics of Digital Wireless Communication
46 min

Basics of Digital Wireless Communication

introduction to software radio principles

Venenerkennung hacken
39 min

Venenerkennung hacken

Vom Fall der letzten Bastion biometrischer Systeme

Reality Check! Basel/Lagos?? In virtual reality?
56 min

Reality Check! Basel/Lagos?? In virtual reality?

An African tale of art, culture and technology

An introduction to Firmware Analysis
40 min

An introduction to Firmware Analysis

Techniques - Tools - Tricks

Don't Ruck Us Too Hard - Owning Ruckus AP Devices
48 min

Don't Ruck Us Too Hard - Owning Ruckus AP Devices

3 different RCE vulnerabilities on Ruckus Wireless access…

Uncaging Microchips
61 min

Uncaging Microchips

Techniques for Chip Preparation

Quantum Computing: Are we there yet?
61 min

Quantum Computing: Are we there yet?

An introduction to quantum computing and a review of the…

Wohnungsbot: An Automation-Drama in Three Acts
40 min

Wohnungsbot: An Automation-Drama in Three Acts

A media-art project which automates the search for flats in…

Harry Potter and the Not-So-Smart Proxy War
35 min

Harry Potter and the Not-So-Smart Proxy War

Taking a look at a covert CIA virtual fencing solution

Deep Learning Blindspots
53 min

Deep Learning Blindspots

Tools for Fooling the "Black Box"

Reverse engineering FPGAs
42 min

Reverse engineering FPGAs

Dissecting FPGAs from bottom up, extracting schematics and…