Search for "Hans de Raad" returned 1103 results
59 min
De-anonymizing Programmers
Large Scale Authorship Attribution from Executable Binaries…
49 min
BREACH in Agda
Security notions, proofs and attacks using dependently…
55 min
Cyber Necromancy
Reverse Engineering Dead Protocols
39 min
DISNOVATION.ORG
Disobedient Innovation
61 min
How Alice and Bob meet if they don't like onions
Survey of Network Anonymisation Techniques
44 min
ASLR on the line
Practical cache attacks on the MMU
28 min
SatNOGS: Crowd-sourced satellite operations
Satellite Open Ground Station Network
42 min
Union Busting
What is it and why you should care
22 min
Trust us and our business will expand!
Net-activism strategies against fake web companies
60 min
Internet Cube
Let's Build together a Free, Neutral and Decentralized…
32 min
Finding the Weak Crypto Needle in a Byte Haystack
Automatic detection of key-reuse vulnerabilities
64 min
It Always Feels Like the Five Eyes Are Watching You
Five Eyes’ Quest For Security Has Given Us Widespread…
26 min
Against Metadata
Twisting time and space to explore the unknown
46 min
CounterStrike
Lawful Interception
58 min
07KINGSTON25 JAMAICA: MALARIA UPDATE Dispatches from Fort Meade
Reporting on the secret trial of Chelsea Manning
38 min