Search for "Hans de Raad" returned 1103 results

De-anonymizing Programmers
59 min

De-anonymizing Programmers

Large Scale Authorship Attribution from Executable Binaries…

BREACH in Agda
49 min

BREACH in Agda

Security notions, proofs and attacks using dependently…

Cyber Necromancy
55 min

Cyber Necromancy

Reverse Engineering Dead Protocols

Axoloti
29 min

Axoloti

DIY audio signal processing

How Alice and Bob meet if they don't like onions
61 min

How Alice and Bob meet if they don't like onions

Survey of Network Anonymisation Techniques

ASLR on the line
44 min

ASLR on the line

Practical cache attacks on the MMU

SatNOGS: Crowd-sourced satellite operations
28 min

SatNOGS: Crowd-sourced satellite operations

Satellite Open Ground Station Network

Union Busting
42 min

Union Busting

What is it and why you should care

Trust us and our business will expand!
22 min

Trust us and our business will expand!

Net-activism strategies against fake web companies

Internet Cube
60 min

Internet Cube

Let's Build together a Free, Neutral and Decentralized…

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

It Always Feels Like the Five Eyes Are Watching You
64 min

It Always Feels Like the Five Eyes Are Watching You

Five Eyes’ Quest For Security Has Given Us Widespread…

Against Metadata
26 min

Against Metadata

Twisting time and space to explore the unknown

CounterStrike
46 min

CounterStrike

Lawful Interception

07KINGSTON25 JAMAICA: MALARIA UPDATE Dispatches from Fort Meade
58 min

07KINGSTON25 JAMAICA: MALARIA UPDATE Dispatches from Fort Meade

Reporting on the secret trial of Chelsea Manning

Modeling and Simulation of Physical Systems for Hobbyists
38 min

Modeling and Simulation of Physical Systems for Hobbyists

Essential Tools for Developing, Testing and Debugging…