Search for "andi" returned 7269 results

Subverting AJAX
53 min

Subverting AJAX

Next generation vulnerabilities in 2.0 Web Applications

Counter-Development
63 min

Counter-Development

The Accessibility of Technology as an Addendum to…

Opening Closed Systems with GlitchKit
60 min

Opening Closed Systems with GlitchKit

'Liberating' Firmware from Closed Devices with Open Source…

Rowhammer exploit
38 min

Rowhammer exploit

Viability of the Rowhammer Attack when ECC memory is used