| Title |
Type |
Location |
Serial |
Start |
End |
All Day |
|
|
Tutorial 1: Secure Programming (Iason Becker) |
Tutorial |
SR 016, E1.3 |
6 |
29.06.26 |
29.06.26 |
No |
|
|
Tutorial 1: Debugging (Iason Becker) |
Tutorial |
SR 016, E1.3 |
6 |
25.05.26 |
25.05.26 |
No |
|
|
Tutorial 1: Sandboxing (Iason Becker) |
Tutorial |
SR 016, E1.3 |
6 |
06.07.26 |
06.07.26 |
No |
|
|
Tutorial 1: Memory Corruption 2 (Iason Becker) |
Tutorial |
SR 016, E1.3 |
6 |
11.05.26 |
11.05.26 |
No |
|
|
Tutorial 1: Side-Channel Attacks (Iason Becker) |
Tutorial |
SR 016, E1.3 |
6 |
13.07.26 |
13.07.26 |
No |
|
|
Tutorial 1: Introduction (Iason Becker) |
Tutorial |
SR 016, E1.3 |
6 |
13.04.26 |
13.04.26 |
No |
|
|
Tutorial 1: Mitigations (Iason Becker) |
Tutorial |
SR 016, E1.3 |
6 |
22.06.26 |
22.06.26 |
No |
|
|
Tutorial 1: Exploits (Iason Becker) |
Tutorial |
SR 016, E1.3 |
6 |
15.06.26 |
15.06.26 |
No |
|
|
Lecture: Memory Corruption 1 |
Lecture |
E2.2, 0.01 (GHH) |
2 |
30.04.26 |
30.04.26 |
No |
|
|
Lecture: Operating Systems |
Lecture |
E2.2, 0.01 (GHH) |
2 |
23.04.26 |
23.04.26 |
No |
|