Search for person "Jeroen van der Ham"
prev
next
58 min
A survey of BSD kernel vulnerabilities.
38 min
oder wie man in einen Walfisch klettert, ohne ihn dabei zu…
29 min
Several failure modes of the hacker scene
51 min
A look at the security of 3rd party iOS applications
61 min
why clearing memory is hard.
25 min
Uptime and QoS monitor for geospatial web-services
55 min
The key elements of policy hacking
62 min
Auditing Boot Loaders by Example
53 min
ensuring civil rights in the digital era
prev
next