Search for "Udo Vetter" returned 1133 results
36 min
A Blockchain Picture Book
Blockchain origins and related buzzwords, described in…
60 min
On the insecure nature of turbine control systems in power generation
A security study of turbine control systems in power…
43 min
No PoC? No Fix! - A sad Story about Bluetooth Security
It is just a broken memcpy in the Bluetooth stack. Do we…
48 min
Don't Ruck Us Too Hard - Owning Ruckus AP Devices
3 different RCE vulnerabilities on Ruckus Wireless access…
39 min
Web-based Cryptojacking in the Wild
When your browser is mining coins for other people
31 min
The Clash of Digitalizations
The Devolution of Arab Men from Humans to Digital Fodder
36 min
Understanding the Snooper’s Charter
Theresa May’s effort to abolish privacy
45 min
HbbTV Security
OMG - my Smart TV got pr0wn3d
41 min
Conquering Large Numbers at the LHC
From 1 000 000 000 000 000 to 10: Breaking down 14 Orders…
120 min
Hacker Jeopardy
Zahlenraten für Geeks
47 min
Hardening hardware and choosing a #goodBIOS
Clean boot every boot - rejecting persistence of malicious…
57 min
"Fluxus cannot save the world."
What hacking has to do with avantgarde art of the 1960ies…
61 min
Damn Vulnerable Chemical Process
Exploitation in a new media
61 min
Enclosure-PUF
Tamper Proofing Commodity Hardware and other Applications
58 min
PLC-Blaster
Ein Computerwurm für PLCs
60 min