Search for "Andi" returned 7497 results

Rowhammer exploit
38 min

Rowhammer exploit

Viability of the Rowhammer Attack when ECC memory is used

For Fox’s Sake
16 min

For Fox’s Sake

Bypassing Enterprise Policy in Firefox

(opensource == secure)? Yes, if you audit it!
18 min

(opensource == secure)? Yes, if you audit it!

Tales in a life of a product security engineer making…

Power to the Patient
47 min

Power to the Patient

How Crowdsourcing could change Biomedicine

We lost the war
73 min

We lost the war

Welcome to the world of tomorrow

Squeezing Attack Traces
38 min

Squeezing Attack Traces

How to get useable information out of your honeypot

AllColoursAreBeautiful
35 min

AllColoursAreBeautiful

interactive light installation inspired by blinkenlights

The coming war on general computation
54 min

The coming war on general computation

The copyright war was just the beginning

Designing a 3D printed tool for medical use
38 min

Designing a 3D printed tool for medical use

From reverse engineering to iterative design

COMPLETE Hard Disk Encryption with FreeBSD
66 min

COMPLETE Hard Disk Encryption with FreeBSD

Learn how to effectively protect not only your data but…

Secure Code
57 min

Secure Code

Why developing Secure Software is like playing Marble…