Search for "sven" returned 2170 results

Don't Ruck Us Too Hard - Owning Ruckus AP Devices
48 min

Don't Ruck Us Too Hard - Owning Ruckus AP Devices

3 different RCE vulnerabilities on Ruckus Wireless access…

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

Quantum Mechanics
57 min

Quantum Mechanics

A Gentle Introduction

Funky File Formats
51 min

Funky File Formats

Advanced binary tricks

"The" Social Credit System
61 min

"The" Social Credit System

Why It's Both Better and Worse Than We can Imagine

The ArduGuitar
30 min

The ArduGuitar

An Arduino Powered Electric Guitar

Attacking end-to-end email encryption
60 min

Attacking end-to-end email encryption

Efail, other attacks and lessons learned.

To Protect And Infect, Part 2
62 min

To Protect And Infect, Part 2

The militarization of the Internet

Bootloader Crimes
21 min

Bootloader Crimes

Building disposable Windows VMs

Quantum Cryptography
60 min

Quantum Cryptography

from key distribution to position-based cryptography