Search for "Ute Holl" returned 1363 results
58 min
Cyber all the Wassenaars
Export controls and exploit regulations: braindead and…
72 min
State of the Onion
Neuland
55 min
The Gospel of IRMA
Attribute Based Credentials in Practice
58 min
Wie klimafreundlich ist Software?
Einblicke in die Forschung und Ausblick in die…
63 min
The Global Assassination Grid
The Infrastructure and People behind Drone Killings
64 min
Technical aspects of the surveillance in and around the Ecuadorian embassy in London
Details about the man hunt for Julian Assange and Wikileaks
62 min
Corporate surveillance, digital tracking, big data & privacy
How thousands of companies are profiling, categorizing,…
60 min
Lets break modern binary code obfuscation
A semantics based approach
59 min
Memory Deduplication: The Curse that Keeps on Giving
A tale of 3 different memory deduplication based…
32 min
Finding the Weak Crypto Needle in a Byte Haystack
Automatic detection of key-reuse vulnerabilities
55 min
Attribution revolution
Turning copyright upside-down with metadata
58 min
Glitching For n00bs
A Journey to Coax Out Chips' Inner Secrets
61 min