Search for "W. Heck" returned 1261 results

Writing secure software
46 min

Writing secure software

using my blog as example

TrustZone-M(eh): Breaking ARMv8-M's security
57 min

TrustZone-M(eh): Breaking ARMv8-M's security

Hardware attacks on the latest generation of ARM Cortex-M…

Lockpicking in the IoT
60 min

Lockpicking in the IoT

...or why adding BTLE to a device sometimes isn't smart at…

DNGerousLINK
52 min

DNGerousLINK

A Deep Dive into WhatsApp 0-Click Exploits on iOS and…

NEW IMPORTANT INSTRUCTIONS
42 min

NEW IMPORTANT INSTRUCTIONS

Real-world exploits and mitigations in Large Language Model…

Check your privileges!
60 min

Check your privileges!

How to drop more of your privileges to reduce attack…

DevOps but for artworks in museums
61 min

DevOps but for artworks in museums

A look into pipelines ending in museums and not in the cloud

ID Cards in China: Your Worst Nightmare
39 min

ID Cards in China: Your Worst Nightmare

In China Your ID Card Knows Everything

Tractors, Rockets and the Internet in Belarus
43 min

Tractors, Rockets and the Internet in Belarus

How belarusian authoritarian regime is using technologies…

Android DDI
47 min

Android DDI

Dynamic Dalvik Instrumentation of Android Applications and…

We should share our secrets
59 min

We should share our secrets

Shamir secret sharing: How it works and how to implement it