Search for "Sven" returned 1989 results

48 min
REXUS/BEXUS - Rocket and Balloon Experiments for University Students
How to bring student experiments into space.

45 min
Triggering Deep Vulnerabilities Using Symbolic Execution
Deep program analysis without the headache

51 min
Ecuador: how an authoritarian government is fooling the entire world
Guess what? The Government of Rafael Correa actually is…

59 min
TamaGo - bare metal Go framework for ARM SoCs.
Reducing the attack surface with pure embedded Go.

61 min
Correcting copywrongs
European copyright reform is finally on the horizon

55 min
White-Box Cryptography
Survey

56 min
Electronic Bank Robberies
Stealing Money from ATMs with Malware

57 min
“I feel like a criminal and I have to be god at the same time”
Perceptions of hackers and hacktivists on their…

21 min
Nerds touching grass
Let’s start a bio-hackspace-revolution

32 min
Craft, leisure, and end-user innovation
How hacking is conceived in social science research

36 min
Long Distance Quantum Communication
Concepts and components for intercontinal communication…

51 min
Uncovering vulnerabilities in Hoermann BiSecur
An AES encrypted radio system

49 min
BREACH in Agda
Security notions, proofs and attacks using dependently…

55 min
Revisiting SSL/TLS Implementations
New Bleichenbacher Side Channels and Attacks

46 min
You can -j REJECT but you can not hide: Global scanning of the IPv6 Internet
Finding interesting targets in 128bit of entropy

59 min
Hardsploit: A Metasploit-like tool for hardware hacking
A complete toolbox for IoT security

29 min
Heartache and Heartbleed: The insider’s perspective on the aftermath of Heartbleed
The untold story of what really happened, how it was…

62 min
The Ghost in the Machine
An Artificial Intelligence Perspective on the Soul

49 min