Year of publication
Type of media
Source
Subject
Type of material
Licence
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Sneaking In Network Security: Enforcing strong network segmentation, without anyone noticing
Conference/TalkTIB AV-Portal | 2018|Keywords: Security -
Attacking Chrome IPC: Reliably finding bugs to escape the Chrome sandbox
Conference/TalkTIB AV-Portal | 2018|Keywords: Security -
The Rocky Road to TLS 1.3 and better Internet Encryption
Conference/TalkTIB AV-Portal | 2018|Keywords: Security -
Circumventing video identification using augmented reality
Conference/TalkTIB AV-Portal | 2018|Keywords: Security -
What The Fax?!: Hacking your network likes it's 1980 again
Conference/TalkTIB AV-Portal | 2018|Keywords: Security -
All Your Gesundheitsakten Are Belong To Us
Conference/TalkTIB AV-Portal | 2018|Keywords: Security -
Viva la Vita Vida: Hacking the most secure handheld console
Conference/TalkTIB AV-Portal | 2018|Keywords: Security -
The Layman's Guide to Zero-Day Engineering: A demystification of the exploit development lifecycle
Conference/TalkTIB AV-Portal | 2018|Keywords: Security -
Inside the AMD Microcode ROM: (Ab)Using AMD Microcode for fun and security
Conference/TalkTIB AV-Portal | 2018|Keywords: Security -
A deep dive into the world of DOS viruses: Explaining in detail just how those little COM files infected and played with us back in the day
Conference/TalkTIB AV-Portal | 2018|Keywords: Security -
Self-encrypting deception: weaknesses in the encryption of solid state drives (SSDs)
Conference/TalkTIB AV-Portal | 2018|Keywords: Security -
Venenerkennung hacken: Vom Fall der letzten Bastion biometrischer Systeme
Conference/TalkTIB AV-Portal | 2018|Keywords: Security -
Web-based Cryptojacking in the Wild: When your browser is mining coins for other people
Conference/TalkTIB AV-Portal | 2018|Keywords: Security -
You can -j REJECT but you can not hide: Global scanning of the IPv6 Internet: Finding interesting targets in 128bit of entropy
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
Decoding the LoRa PHY: Dissecting a Modern Wireless Network for the Internet of Things
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
Exploiting PHP7 unserialize: teaching a new dog old tricks
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
DPRK Consumer Technology: Facts to fight lore
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
SELinux und AppArmor: Wenn rwx mit ugo zu ungenau ist
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
Ladeinfrastruktur für Elektroautos: Ausbau statt Sicherheit: Warum das Laden eines Elektroautos unsicher ist
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
Truly cardless: Jackpotting an ATM using auxiliary devices.
Conference/TalkTIB AV-Portal | 2018|Keywords: Security -
A Christmas Carol - The Spectres of the Past, Present, and Future
Conference/TalkTIB AV-Portal | 2018|Keywords: Security -
Domain Name System: Hierarchical decentralized naming system used since 30 years
Conference/TalkTIB AV-Portal | 2018|Keywords: Security -
Provable Security: How I learned to stop worrying and love the backdoor
Conference/TalkTIB AV-Portal | 2018|Keywords: Security -
Bootstraping a slightly more secure laptop
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
Æ-DIR: Paranoid user management with OpenLDAP
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
Inside Android’s SafetyNet Attestation: Attack and Defense
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
What could possibly go wrong with ?: Side effects include side-channel attacks and bypassing kernel ASLR
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
Build your own NSA: How private companies leak your personal data into the public domain, and how you can buy it.
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
Gone in 60 Milliseconds: Intrusion and Exfiltration in Server-less Architectures
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
TrustZone is not enough: Hijacking debug components for embedded security
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
eMMC hacking, or: how I fixed long-dead Galaxy S3 phones: A journey on how to fix broken proprietary hardware by gaining code execution on it
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
Predicting and Abusing WPA2/802.11 Group Keys
Conference/TalkTIB AV-Portal | 2017|Keywords: Security -
Microarchitectural Attacks on Trusted Execution Environments
Conference/TalkTIB AV-Portal | 2017|Keywords: Security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.