Search for person "Ilja van Sprundel"
next
73 min
expanding the attack surface and then some
58 min
A survey of BSD kernel vulnerabilities.
51 min
A look at the security of 3rd party iOS applications
61 min
why clearing memory is hard.
62 min
Auditing Boot Loaders by Example
46 min
Look what I found under the carpet
107 min
Breaking software in an automated fashion
58 min
An overview of a mobile telephony market and how a…
42 min
How (inter)national money transfers works
31 min
an overview of physically unclonable functions
53 min
An analysis of targeted attacks from 2005 to 2007
44 min
If technology is the solution, politicians are the problem
28 min
or how we learned to stop worrying and love the NSA
next