Search for "W. Heck" returned 1207 results

61 min
Damn Vulnerable Chemical Process
Exploitation in a new media

61 min
Code Pointer Integrity
... or how we battle the daemons of memory safety

39 min
Making homebrew for your very own Vector Super Computer
Adventures running a NEC Vector Engine for fun and ...…

46 min
Practical Mix Network Design
Strong metadata protection for asynchronous messaging

51 min
Uncovering vulnerabilities in Hoermann BiSecur
An AES encrypted radio system

62 min
radare demystified
after 1.0

38 min
KOALitionsvertragsAnalyse
Mit Tools & Methoden dem Vertrag auf den Zahn fühlen

42 min
Firmware Fat Camp
Embedded Security Using Binary Autotomy

39 min
The automobile as massive data gathering source and the consequences for individual…
The next big privacy heist

58 min
Thwarting Evil Maid Attacks
Physically Unclonable Functions for Hardware Tamper…

57 min
Protecting the Wild
Conservation Genomics between Taxonomy, Big Data,…

41 min
POC (mit ISDN)
Frag die Teams

47 min
Finding Vulnerabilities in Internet-Connected Devices
A Beginner’s Guide

58 min