Search for "sec" returned 2526 results

Extended DNA Analysis
31 min

Extended DNA Analysis

Political pressure for DNA-based facial composites

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

What is this? A machine learning model for ants?
40 min

What is this? A machine learning model for ants?

How to shrink deep learning models, and why you would want…

Safe and Secure Drivers in High-Level Languages
61 min

Safe and Secure Drivers in High-Level Languages

How to write PCIe drivers in Rust, go, C#, Swift, Haskell,…

Wind: Off-Grid Services for Everyday People
60 min

Wind: Off-Grid Services for Everyday People

Integrating nearby and offline connectivity with the…

Was tun gegen Digitale Gewalt gegen Frauen
41 min

Was tun gegen Digitale Gewalt gegen Frauen

"Nicht dem Phänomen Cybercrime im engeren Sinne zuzuordnen"…

Lightning Talks I
34 min

Lightning Talks I

Routenplanung durch Flächen - Interaktive Visualisierung…

Understanding and fixing cross-compilation requirements
54 min

Understanding and fixing cross-compilation requirements

How to make your FOSS project cross-compilation friendly

Hacking (with) a TPM
37 min

Hacking (with) a TPM

Don't ask what you can do for TPMs, Ask what TPMs can do…

Artistic PCB Design and Fabrication
36 min

Artistic PCB Design and Fabrication

From doodle to manufacture: how I make mechanically…

SELECT code_execution FROM * USING SQLite;
46 min

SELECT code_execution FROM * USING SQLite;

--Gaining code execution using a malicious SQLite database

Hacking German Elections
63 min

Hacking German Elections

Insecure Electronic Vote Counting - How It Returned and Why…