Search for "luky" returned 254 results
58 min
Self-encrypting deception
weaknesses in the encryption of solid state drives (SSDs)
48 min
10 Years of Fun with Embedded Devices
How OpenWrt evolved from a WRT54G firmware to an universal…
62 min
Bionic Ears
Introduction into State-of-the-Art Hearing Aid Technology
54 min
AMD x86 SMU firmware analysis
Do you care about Matroshka processors?
30 min
In Search of Evidence-Based IT-Security
IT security is largely a science-free field. This needs to…
33 min
Rebel Cities
Towards A Global Network Of Neighbourhoods And Cities…
54 min
Do You Think That's Funny?
Art Practice under the Regime of Anti-Terror Legislation
60 min
Intel Management Engine deep dive
Understanding the ME at the OS and hardware level
40 min
An introduction to Firmware Analysis
Techniques - Tools - Tricks
58 min
Cyber all the Wassenaars
Export controls and exploit regulations: braindead and…
63 min
Traue keinem Scan, den du nicht selbst gefälscht hast
"Bei Kopierern kommt das raus, was man reinsteckt." – Wer…
61 min
Holography of Wi-Fi radiation
Can we see the stray radiation of wireless devices? And…
62 min
The Tor Network
We're living in interesting times
30 min
The ArduGuitar
An Arduino Powered Electric Guitar
60 min
Why is GPG "damn near unusable"?
An overview of usable security research
59 min