Search for "Ute Holl" returned 1357 results

55 min
The Gospel of IRMA
Attribute Based Credentials in Practice

62 min
Corporate surveillance, digital tracking, big data & privacy
How thousands of companies are profiling, categorizing,…

60 min
Lets break modern binary code obfuscation
A semantics based approach

59 min
Memory Deduplication: The Curse that Keeps on Giving
A tale of 3 different memory deduplication based…

63 min
The Global Assassination Grid
The Infrastructure and People behind Drone Killings

32 min
Finding the Weak Crypto Needle in a Byte Haystack
Automatic detection of key-reuse vulnerabilities

58 min
Wie klimafreundlich ist Software?
Einblicke in die Forschung und Ausblick in die…

64 min
Technical aspects of the surveillance in and around the Ecuadorian embassy in London
Details about the man hunt for Julian Assange and Wikileaks

61 min
Trustworthy secure modular operating system engineering
fun(ctional) operating system and security protocol…

55 min
Attribution revolution
Turning copyright upside-down with metadata

58 min
Glitching For n00bs
A Journey to Coax Out Chips' Inner Secrets

46 min
SELECT code_execution FROM * USING SQLite;
--Gaining code execution using a malicious SQLite database

63 min
goto fail;
exploring two decades of transport layer insecurity

58 min
Script Your Car!
Using existing hardware platforms to integrate python into…

59 min
Fernvale: An Open Hardware and Software Platform, Based on the (nominally) Closed-Source…
A Lawful Method for Converting Closed IP into Open IP

61 min
An Elevator to the Moon (and back)
Space Transportation and the Extraterrestrial Imperative

62 min