Search for "henk" returned 166 results

Die göttliche Informatik
61 min

Die göttliche Informatik

Die Informatik löst formale (mathematisch modellierte)…

In Search of Evidence-Based IT-Security
30 min

In Search of Evidence-Based IT-Security

IT security is largely a science-free field. This needs to…

Hacker Jeopardy
120 min

Hacker Jeopardy

Zahlenraten für Geeks

Hack_Curio
58 min

Hack_Curio

Decoding The Cultures of Hacking One Video at a Time

Wheel of Fortune
36 min

Wheel of Fortune

Analyzing Embedded OS Random Number Generators

Why is GPG "damn near unusable"?
60 min

Why is GPG "damn near unusable"?

An overview of usable security research

Code Pointer Integrity
61 min

Code Pointer Integrity

... or how we battle the daemons of memory safety

Hacking (with) a TPM
37 min

Hacking (with) a TPM

Don't ask what you can do for TPMs, Ask what TPMs can do…

Attribution revolution
55 min

Attribution revolution

Turning copyright upside-down with metadata

Damn Vulnerable Chemical Process
61 min

Damn Vulnerable Chemical Process

Exploitation in a new media