Kevin Neuhöfer: „On the Feasibility of Post-Decompilation Goto Removal and...
Everybody is cordially invited to attend.
View ArticleMichael Külper: „Proxy Patrol: Systematizing and Investigating Network...
Everybody is cordially invited to attend.
View ArticleMichael Külper: „Port-rait of a Hacker: Unmasking Malicious Server...
Everybody is cordially invited to attend.
View ArticleAxel Mahr: „Dissecting and Systematizing C2 Protocols of Prevalent RATs"
Everybody is cordially invited to attend.
View ArticleAxel Mahr: „RATatouille: Developing Recipes for RAT Controller Detection and...
Everybody is cordially invited to attend.
View ArticleJoshua Huberti: „Verbesserung der Dateisystem-Exploration von SIM-Karten...
Everybody is cordially invited to attend.
View ArticleHelga Behrendt: „Identification of SSL wrapper functions in Android-based...
Everybody is cordially invited to attend.
View ArticleElias Gläßer: "Identity Leakage User Experience"
Everybody is cordially invited to attend.
View ArticleEvelyn Lippmann: "Implemented Security Check of Cybersecurity-Systems for...
Everybody is cordially invited to attend.
View ArticleDaniel Lingnau: "Erweiterung des OpenIDN-Laser-DAC-Framework" - VERSCHOBEN!...
Everybody is cordially invited to attend.
View ArticleAlexandra Kimmel und Mathias Maureder: "Möglichkeiten des Session Hijacking...
(Abschlussvortrag PG IT-Sicherheit/Cyber Security)
View ArticleAmelie Artmann: "Bewertung der Sicherheit von KI-gestützter Codegenerierung"
(Abschlussvortrag PG IT-Sicherheit/Cyber Security)
View ArticleCarl Gadde und Florian Willms: "Automatisches Sammeln maliziöser...
(Abschlussvortrag PG IT-Sicherheit/Cyber Security)
View ArticleDaniel Lingnau: "Erweiterung des OpenIDN-Laser-DAC-Framework"
Everybody is cordially invited to attend.
View ArticleRoman Lichnok: "Erweiterung des IDN Dissectors in Wireshark"
Everybody is cordially invited to attend.
View ArticleMaria Alexander und Joris Lamberty: "Nachbau eines...
(Abschlussvortrag PG IT-Sicherheit/Cyber Security)
View ArticleGregor Hagemann und Georg Heindl: "Pipeline für ressourcenschonende...
(Abschlussvortrag PG IT-Sicherheit/Cyber Security)
View ArticleAura Pop: "Erstellung einer IT-Sicherheitsschulung"
Everybody is cordially invited to attend.
View ArticleGregor Bauer: "Analyse der Reproduzierbarkeit von Builds bei...
Everybody is cordially invited to attend.
View Article