Search for person "Ilja van Sprundel"

X Security
61 min

X Security

It's worse than it looks

hacking smart phones
73 min

hacking smart phones

expanding the attack surface and then some

Are all BSDs created equally?
58 min

Are all BSDs created equally?

A survey of BSD kernel vulnerabilities.

iOS application security
51 min

iOS application security

A look at the security of 3rd party iOS applications

Memsad
61 min

Memsad

why clearing memory is hard.

Boot2root
62 min

Boot2root

Auditing Boot Loaders by Example

A collection of random things
46 min

A collection of random things

Look what I found under the carpet

Fuzzing
107 min

Fuzzing

Breaking software in an automated fashion

Setting mobile phones free
58 min

Setting mobile phones free

An overview of a mobile telephony market and how a…

A world without blockchain
42 min

A world without blockchain

How (inter)national money transfers works

PUFs, protection, privacy, PRNGs
31 min

PUFs, protection, privacy, PRNGs

an overview of physically unclonable functions

Crouching Powerpoint, Hidden Trojan
53 min

Crouching Powerpoint, Hidden Trojan

An analysis of targeted attacks from 2005 to 2007

Why technology sucks
44 min

Why technology sucks

If technology is the solution, politicians are the problem

Long war tactics
28 min

Long war tactics

or how we learned to stop worrying and love the NSA