Search for "andi" returned 7497 results

Zero-sized heap allocations vulnerability analysis
65 min

Zero-sized heap allocations vulnerability analysis

Applications of theorem proving for securing the windows…

For Fox’s Sake
16 min

For Fox’s Sake

Bypassing Enterprise Policy in Firefox

The Limits of General Purpose SDR devices
46 min

The Limits of General Purpose SDR devices

Why an SDR board like a USRP or LimeSDR is not a cellular…

Rowhammer exploit
38 min

Rowhammer exploit

Viability of the Rowhammer Attack when ECC memory is used

Hardware games
38 min

Hardware games

How to build alternative controllers

Machine Dreams
62 min

Machine Dreams

Dreaming Machines

Wifibroadcast
42 min

Wifibroadcast

How to convert standard wifi dongles into digital broadcast…

(opensource == secure)? Yes, if you audit it!
18 min

(opensource == secure)? Yes, if you audit it!

Tales in a life of a product security engineer making…

Opening Closed Systems with GlitchKit
60 min

Opening Closed Systems with GlitchKit

'Liberating' Firmware from Closed Devices with Open Source…