Max Hahnbück: „Automatische Deobfuskation ausgewählter...
Everybody is cordially invited to attend.
View ArticleSebastian Tauchert: „Building and feeding a fully automated exploitation...
Everybody is cordially invited to attend.
View ArticleJodie Pietz: „Current Security and Privacy Challenges and Solutions in Cloud...
Everybody is cordially invited to attend.
View ArticleCedric Keienburg: „Leveraging crowd-sourced knowledge for automatic target...
Everybody is cordially invited to attend.
View ArticleIoannis Stavrou: „Design and Implementation of an Environment for the...
Everybody is cordially invited to attend.
View ArticleMarcel Melchers: „Survey on Function Detection Approaches in Binaries"
Everybody is cordially invited to attend.
View ArticleLeo Kyster Oerter: "Die CPU Verwundbarkeit Meltdown"
Everybody is cordially invited to attend.
View ArticleLeonie Köchling: "Die CPU Verwundbarkeit Spectre"
Everybody is cordially invited to attend.
View ArticleLennart Haas: "Detection of misconfigurations in server-side software through...
Everybody is cordially invited to attend.
View ArticleFelix Betke, Lennart Hein, Melina Hoffmann and Jan-Niclas Sohn "Transient...
Everybody is cordially invited to attend.
View ArticleTimo Pohl "Recovering Messages from DSSS Signals without prior Knowledge...
Everybody is cordially invited to attend.
View ArticleNils Auler and Elias Werberich "Network Emulation on Kubernetes"
Everybody is cordially invited to attend.
View ArticleOlid Mohd Sayed: „Obfuscation of files to avoid (similarity) hash based...
Everybody is cordially invited to attend.
View ArticleLukas Wenz: „Erkennung von E-Mail-Spam-Wellen über ausgewählte Regelsysteme...
Everybody is cordially invited to attend.
View ArticleJoris Kutzner: „Evaluating the efficacy of signature scanning in live memory"
Everybody is cordially invited to attend.
View ArticlePaul Scherer: „A Comparison of Alert Prioritisation Methods in SOCs"
Everybody is cordially invited to attend.
View ArticleKaywan Katibeh: „Embedded Device Security: Gathering Web Stack Information in...
Everybody is cordially invited to attend.
View ArticleTobias Wilkat: „Performance and Energy Consumption Analysis of Security Tools"
Everybody is cordially invited to attend.
View ArticleFelix Lehmann: "Vergleich klassischer Seitenkanalangriffe gegenüber Deep...
Everybody is cordially invited to attend.
View ArticleKarl Friedrich Hermann "Automatisierung eines IoT Penetrationstests mit IoT...
Everybody is cordially invited to attend.
View Article