Search for "Ute Holl" returned 1413 results

The Global Assassination Grid
63 min

The Global Assassination Grid

The Infrastructure and People behind Drone Killings

Don't stop 'til you feel it
63 min

Don't stop 'til you feel it

Artistic interventions in climate change

AMD x86 SMU firmware analysis
54 min

AMD x86 SMU firmware analysis

Do you care about Matroshka processors?

Replication Prohibited
44 min

Replication Prohibited

3D printed key attacks

Union Busting
42 min

Union Busting

What is it and why you should care

ZombieLoad Attack
55 min

ZombieLoad Attack

Leaking Your Recent Memory Operations on Intel CPUs

goto fail;
63 min

goto fail;

exploring two decades of transport layer insecurity

SELECT code_execution FROM * USING SQLite;
46 min

SELECT code_execution FROM * USING SQLite;

--Gaining code execution using a malicious SQLite database

Script Your Car!
58 min

Script Your Car!

Using existing hardware platforms to integrate python into…

Confessions of a future terrorist
58 min

Confessions of a future terrorist

A rough guide to over-regulating free speech with…

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

Visiting The Bear Den
59 min

Visiting The Bear Den

A Journey in the Land of (Cyber-)Espionage

Trustworthy secure modular operating system engineering
61 min

Trustworthy secure modular operating system engineering

fun(ctional) operating system and security protocol…