Search for person "Walter van Holst (Vrijschrift)" returned 141 results

58 min
Are all BSDs created equally?
A survey of BSD kernel vulnerabilities.

58 min
Cyber all the Wassenaars
Export controls and exploit regulations: braindead and…

29 min
Infocalypse now: P0wning stuff is not enough
Several failure modes of the hacker scene

44 min
Life Needs Internet
Documenting digital culture through handwritten letters

31 min
PUFs, protection, privacy, PRNGs
an overview of physically unclonable functions

42 min
A world without blockchain
How (inter)national money transfers works

53 min
Smart, safe & happy
ensuring civil rights in the digital era

58 min
OpenINTEL: digging in the DNS with an industrial size digger
I measured 60% of the DNS, and I found this

27 min
Detecting a breach from an attackers perspective.
We're gonna regret this

60 min
Flip Feng Shui
Advanced Rowhammer exploitation on cloud, desktop, and…

53 min
TBM: Trusted boot module
NLNet sponsored (open hardware) trusted boot module

60 min
Windows drivers attack surface
some 'new' insights

82 min
Maker-Board meets Chiptunes
8-Bit-Rechner als Musikinstrumente

45 min