51 min
Secure Boot support in qemu, kvm and ovmf.
64 min
Dissecting a Modern Wireless Network for the Internet of…
59 min
On the Privacy & Security of the Ultrasound Tracking…
59 min
A tale of 3 different memory deduplication based…
37 min
A systemic update of sensitive information that you sniff…
40 min
Call the frontdoor to install your backdoors
60 min
How private companies leak your personal data into the…
64 min
(Not Only) Attacks on OAuth and OpenID Connect
33 min
Intrusion and Exfiltration in Server-less Architectures
36 min
Analyzing Embedded OS Random Number Generators
63 min
A gentle introduction to mobile messaging and subsequent…
59 min
A Journey in the Land of (Cyber-)Espionage
46 min
Finding interesting targets in 128bit of entropy
59 min
Becoming a secret travel agent
61 min
Improving the encrypted the web, one round-trip at a time
61 min
A proposal for secure computing in an age where we cannot…
29 min
Technical Teardown of the Pegasus malware and Trident…
30 min
The Red Pill of N26 Security
44 min
teaching a new dog old tricks
55 min
Side effects include side-channel attacks and bypassing…