Search for "Sven" returned 1989 results

46 min
SELECT code_execution FROM * USING SQLite;
--Gaining code execution using a malicious SQLite database

47 min
Finding Vulnerabilities in Internet-Connected Devices
A Beginner’s Guide

33 min
Turing Complete User
What can be done to protect the term, the notion and the…

58 min
Baseband Exploitation in 2013
Hexagon challenges

59 min
Free Electron Lasers
...or why we need 17 billion Volts to make a picture.

43 min
The Mars Rover On-board Computer
How Curiosity's Onboard Computer works, and what you can…

39 min
Transmission Control Protocol
TCP/IP basics

57 min
Hello World!
How to make art after Snowden?

58 min
Virtual Machine Introspection
From the Outside Looking In

61 min
Trustworthy secure modular operating system engineering
fun(ctional) operating system and security protocol…

62 min
Machine Dreams
Dreaming Machines

35 min
Ethics in the data society
Power and politics in the development of the driverless car

69 min