Search for "Sven" returned 1989 results

Triggering Deep Vulnerabilities Using Symbolic Execution
45 min

Triggering Deep Vulnerabilities Using Symbolic Execution

Deep program analysis without the headache

Ecuador: how an authoritarian government is fooling the entire world
51 min

Ecuador: how an authoritarian government is fooling the entire world

Guess what? The Government of Rafael Correa actually is…

TamaGo - bare metal Go framework for ARM SoCs.
59 min

TamaGo - bare metal Go framework for ARM SoCs.

Reducing the attack surface with pure embedded Go.

Correcting copywrongs
61 min

Correcting copywrongs

European copyright reform is finally on the horizon

Electronic Bank Robberies
56 min

Electronic Bank Robberies

Stealing Money from ATMs with Malware

Nerds touching grass
21 min

Nerds touching grass

Let’s start a bio-hackspace-revolution

Craft, leisure, and end-user innovation
32 min

Craft, leisure, and end-user innovation

How hacking is conceived in social science research

Long Distance Quantum Communication
36 min

Long Distance Quantum Communication

Concepts and components for intercontinal communication…

BREACH in Agda
49 min

BREACH in Agda

Security notions, proofs and attacks using dependently…

Revisiting SSL/TLS Implementations
55 min

Revisiting SSL/TLS Implementations

New Bleichenbacher Side Channels and Attacks

CloudABI
62 min

CloudABI

Pure capability-based security for UNIX

The Ghost in the Machine
62 min

The Ghost in the Machine

An Artificial Intelligence Perspective on the Soul

Toward a Cognitive "Quantified Self"
49 min

Toward a Cognitive "Quantified Self"

Activity Recognition for the Mind