Search for person "Johan Van de Wauw"
prev
next
55 min
The key elements of policy hacking
62 min
Auditing Boot Loaders by Example
33 min
experiences from the “i3 Berlin” 3D printer project with…
60 min
Advanced Rowhammer exploitation on cloud, desktop, and…
53 min
NLNet sponsored (open hardware) trusted boot module
prev
next