Search for "sven" returned 2036 results

33 min
Computer Science in the DPRK
A view into technology on the other side of the world

44 min
ASLR on the line
Practical cache attacks on the MMU

48 min
Don't Ruck Us Too Hard - Owning Ruckus AP Devices
3 different RCE vulnerabilities on Ruckus Wireless access…

65 min
35C3 Infrastructure Review
Up and to the right: All the statistics about this event…

30 min
Privacy and Consumer Markets
Reversing the Surveillance Business Model

56 min
Household, Totalitarianism and Cyberspace
Philosophical Perspectives on Privacy Drawing on the…

60 min
G’scheitern
The art of failure taught by improv theatre

32 min
Why Do We Anthropomorphize Computers?...
...and dehumanize ourselves in the process?

61 min
Ten years after ‚We Lost The War‘
The future does not look much brighter than ten years ago.…

95 min
Platform System Interface
Design und Evaluation holistischer Computerarchitektur

60 min
Sin in the time of Technology
How social media companies are creating a global morality…

40 min
The Extremely Large Telescope (ELT)
Building the biggest optical telescope on earth

32 min
Finding the Weak Crypto Needle in a Byte Haystack
Automatic detection of key-reuse vulnerabilities

57 min
How I Learned to Stop Reinventing and Love the Wheels
or having FUN with (home/hackerspace) robotics

61 min