Title |
Type |
Location |
Serial |
Start |
End |
All Day |
|
Side Channels |
Lecture |
E2 2, Günter-Hotz-Hörsaal |
|
17.07.25 |
17.07.25 |
No |
|
Secure Programming |
Lecture |
E2 2, Günter-Hotz-Hörsaal |
|
03.07.25 |
03.07.25 |
No |
|
Sandboxing & System Hardening |
Lecture |
E2 2, Günter-Hotz-Hörsaal |
|
10.07.25 |
10.07.25 |
No |
|
Operating Systems |
Lecture |
E2 2, Günter-Hotz-Hörsaal |
|
17.04.25 |
17.04.25 |
No |
|
Mitigations |
Lecture |
E2 2, Günter-Hotz-Hörsaal |
|
26.06.25 |
26.06.25 |
No |
|
Memory Corruption - Overflows |
Lecture |
E2 2, Günter-Hotz-Hörsaal |
|
08.05.25 |
08.05.25 |
No |
|
Memory Corruption II & Environment |
Lecture |
E2 2, Günter-Hotz-Hörsaal |
|
15.05.25 |
15.05.25 |
No |
|
Low-level Basics |
Lecture |
E2 2, Günter-Hotz-Hörsaal |
|
24.04.25 |
24.04.25 |
No |
|
Introduction |
Lecture |
E2 2, Günter-Hotz-Hörsaal |
|
10.04.25 |
10.04.25 |
No |
|
Finding Bugs |
Lecture |
E2 2, Günter-Hotz-Hörsaal |
|
12.06.25 |
12.06.25 |
No |
|