Search for "Sven" returned 1989 results

60 min
The Critical Making Movement
How using critical thinking in technological practice can…

60 min
On the insecure nature of turbine control systems in power generation
A security study of turbine control systems in power…

60 min
Beyond Anti Evil Maid
Making it easier to avoid low-level compromise, and why…

59 min
We should share our secrets
Shamir secret sharing: How it works and how to implement it

36 min
Wheel of Fortune
Analyzing Embedded OS Random Number Generators

58 min
PLC-Blaster
Ein Computerwurm für PLCs

60 min
The Perl Jam 2
The Camel Strikes Back

47 min
Hardening hardware and choosing a #goodBIOS
Clean boot every boot - rejecting persistence of malicious…

66 min
Advanced Hexagon Diag
Harnessing diagnostics for baseband vulnerability research

64 min
On the Security and Privacy of Modern Single Sign-On in the Web
(Not Only) Attacks on OAuth and OpenID Connect

64 min
We only have one earth
A case for expansionistic space policy

60 min
Ein Abgrund von Landesverrat
Wie es dazu kam und was daraus zu lernen ist

38 min
ARMore: Pushing Love Back Into Binaries
Aarch64 binary rewriting adventures but mostly pains

67 min
The Maker movement meets patent law
How many windows are open in the patent fortress

63 min
Building Custom Pinball Machines
What you need and how it works. An experiences report

61 min