Search for "Sven" returned 1989 results

58 min
PLC-Blaster
Ein Computerwurm für PLCs

47 min
Hillbilly Tracking of Low Earth Orbit
Repurposing an Inmarsat Dish

36 min
Wheel of Fortune
Analyzing Embedded OS Random Number Generators

31 min
PUFs, protection, privacy, PRNGs
an overview of physically unclonable functions

47 min
Hardening hardware and choosing a #goodBIOS
Clean boot every boot - rejecting persistence of malicious…

27 min
One year of securitarian drift in France
From the Bill on Intelligence to the State of Emergency

64 min
We only have one earth
A case for expansionistic space policy

37 min
Code BROWN in the Air
A systemic update of sensitive information that you sniff…

42 min
A world without blockchain
How (inter)national money transfers works

39 min
The automobile as massive data gathering source and the consequences for individual…
The next big privacy heist

54 min
What Price the Upload Filter?
The history and costs of government exceptional access

60 min
The Critical Making Movement
How using critical thinking in technological practice can…

40 min
Handsfree assistive technology
My technology portfolio to enable work, life, smart home…

60 min
Beyond Anti Evil Maid
Making it easier to avoid low-level compromise, and why…

32 min
Verified Firewall Ruleset Verification
Math, Functional Programming, Theorem Proving, and an…

63 min