Search for person "David Kim"

Dissecting VoLTE
49 min

Dissecting VoLTE

Exploiting Free Data Channels and Security Problems

Enclosure-PUF
61 min

Enclosure-PUF

Tamper Proofing Commodity Hardware and other Applications

When hardware must „just work“
58 min

When hardware must „just work“

An inside look at x86 CPU design

iTopf
6 min

iTopf

Jugend hackt Ulm 2017

Lies, damned lies and scans
52 min

Lies, damned lies and scans

"A copier's output equals its input." You think that's…

Rocket science – how hard can it be?
65 min

Rocket science – how hard can it be?

First steps into space with sounding rockets

Traue keinem Scan, den du nicht selbst gefälscht hast
63 min

Traue keinem Scan, den du nicht selbst gefälscht hast

"Bei Kopierern kommt das raus, was man reinsteckt." – Wer…

Trustworthy secure modular operating system engineering
61 min

Trustworthy secure modular operating system engineering

fun(ctional) operating system and security protocol…

In Love with Ruby
49 min

In Love with Ruby

Warum es sich immer noch lohnt, Ruby zu lernen