Search for person "Jelle van der Waa"
prev
next
51 min
A look at the security of 3rd party iOS applications
61 min
why clearing memory is hard.
44 min
Documenting digital culture through handwritten letters
73 min
expanding the attack surface and then some
58 min
A survey of BSD kernel vulnerabilities.
25 min
Uptime and QoS monitor for geospatial web-services
55 min
The key elements of policy hacking
62 min
Auditing Boot Loaders by Example
58 min
I measured 60% of the DNS, and I found this
53 min
ensuring civil rights in the digital era
prev
next