Search for "Mirar"

From Mirai to Apple
43 min

From Mirai to Apple

How IoT devices bypass Routers

Automated Exploit Detection in Binaries
46 min

Automated Exploit Detection in Binaries

Finding exploitable vulnerabilities in binaries

CR242: Einmal einschmelzen bitte
119 min

CR242: Einmal einschmelzen bitte

Warum modernes CPU-Design uns jetzt in Teufels Küche bringt

CR235: I #WannaCry
119 min

CR235: I #WannaCry

Der Angriff der Cryptotrojaner

Usable Privacy and Security
89 min

Usable Privacy and Security

Gebrauchstaugliche sichere Software

All Creatures Welcome
42 min

All Creatures Welcome

a utopian documentary about the digital age

Trustworthy secure modular operating system engineering
61 min

Trustworthy secure modular operating system engineering

fun(ctional) operating system and security protocol…

Internet of Fails
59 min

Internet of Fails

Where IoT has gone wrong

The Layman's Guide to Zero-Day Engineering
57 min

The Layman's Guide to Zero-Day Engineering

A demystification of the exploit development lifecycle

The Snowden Refugees under Surveillance in Hong Kong
66 min

The Snowden Refugees under Surveillance in Hong Kong

A Rapidly Emerging Police State and Imminent Deportation to…

Domain Name System
42 min

Domain Name System

Hierarchical decentralized naming system used since 30 years