Search for person "Maurice van Brast" returned 100 results

27 min
Detecting a breach from an attackers perspective.
We're gonna regret this

60 min
Flip Feng Shui
Advanced Rowhammer exploitation on cloud, desktop, and…

53 min
TBM: Trusted boot module
NLNet sponsored (open hardware) trusted boot module

30 min
Rowhammer.js: Root privileges for web apps?
A tale of fault attacks on DRAM and attacks on CPU caches

60 min
Windows drivers attack surface
some 'new' insights

61 min
Avoiding kernel panic: Europe’s biggest fails in digital policy-making
How the institutions fuck up, and how we fuck it up as well

45 min
Time affects
Human-computer-synchronizations

58 min
Cyber all the Wassenaars
Export controls and exploit regulations: braindead and…

28 min
Long war tactics
or how we learned to stop worrying and love the NSA

29 min
Infocalypse now: P0wning stuff is not enough
Several failure modes of the hacker scene

38 min
Der Inhalt dieses Vortrags ist in deinem Land leider nicht verfügbar.
oder wie man in einen Walfisch klettert, ohne ihn dabei zu…

61 min
X Security
It's worse than it looks

61 min
Now I sprinkle thee with crypto dust
Internet reengineering session

58 min
Setting mobile phones free
An overview of a mobile telephony market and how a…

55 min
Our daily job: hacking the law
The key elements of policy hacking

51 min
iOS application security
A look at the security of 3rd party iOS applications

73 min
hacking smart phones
expanding the attack surface and then some

44 min
Why technology sucks
If technology is the solution, politicians are the problem

53 min