Quantcast
Browsing all 1944 articles
Browse latest View live

Jonathan Uth und Frederik Weiß: "Die PKCE-Erweiterung"

(Abschlussvortrag PG IT-Sicherheit/Cyber Security) - Teilvortrag 4

View Article


Marie Springborn: "FAPI 2.0 Einordnung der bereits untersuchten Angriffe"

(Abschlussvortrag PG IT-Sicherheit/Cyber Security) - Teilvortrag 3

View Article


Bonnie Jo Mayer: "Financial-grade API Profile 2.0 der Open ID Foundation"

(Abschlussvortrag PG IT-Sicherheit/Cyber Security) - Teilvortrag 2

View Article

Lukas Seifert: "Ausarbeitung eines möglichst unsicheren IDPs, der nach...

(Abschlussvortrag PG IT-Sicherheit/Cyber Security) - Teilvortrag 1

View Article

Jannis Schröder: "Implementierung des Fisheye State Routingalgorithmus in...

Everybody is cordially invited to attend.

View Article


Akin Demir: "Tracking-Risiken erkennen: Ein System zur Analyse von BLE-Daten"

(Abschlussvortrag PG IT-Sicherheit/Cyber Security)

View Article

Damyan Doychev: "Innovationen im Datenschutz: SynDiffix und die Grenzen...

(Abschlussvortrag PG IT-Sicherheit/Cyber Security)

View Article

Afeef Neiroukh: "Entwicklung und Evaluation eines Hardware-Software-Prototyps...

Everybody is cordially invited to attend.

View Article


Amelie Artmann: "Auswirkungen der Promptsprache auf die Sicherheit von...

Everybody is cordially invited to attend.

View Article


Serhii Orlivskyi: „eBPF-based mandatory access control for cloud environments"

Everybody is cordially invited to attend.

View Article

Alexander Kraft: „initanalyzer: Ein Werkzeug zur Analyse von Init-Prozessen"

Everybody is cordially invited to attend.

View Article

Jakob Szidzek: „Fehlkonfigurationen in Firmware"

Everybody is cordially invited to attend.

View Article

Jakob Grüne: „Fallstudie: Über die Prävalenz von sicherheitsrelevanten IPC...

Everybody is cordially invited to attend.

View Article


Jo Weber: „Fooling Decompilers"

Everybody is cordially invited to attend.

View Article

Svenja Löher: „Using dynamic Analysis to determine entrypoints of...

Everybody is cordially invited to attend.

View Article


Axel Mahr: „Dissecting and Systematizing C2 Protocols of Prevalent RATs“

Everybody is cordially invited to attend.

View Article

Michael Külper: „Proxy Patrol: Systematizing and Investigating Network...

Everybody is cordially invited to attend.

View Article


Jonas Boppard: "Aufbau und Hardening eines Operational Technology Labors"

Everybody is cordially invited to attend.

View Article

Serhii Orlivskyi: „eBPF-based mandatory access control for cloud environments"

Everybody is cordially invited to attend.

View Article

Ruven Hartel, Pierre Stöhr, Giorgi Tkebuchava: "Framework für...

(Abschlussvortrag PG IT-Sicherheit/Cyber Security)

View Article
Browsing all 1944 articles
Browse latest View live