54 min
Geschichten aus dem API-und Protokollkrieg von zwei…
57 min
Back to the good old Blue Box?
56 min
Discovering what the hardware architects try to hide from…
71 min
Preventing Flash Exploits
32 min
Layer 8 based IP Address hijacking in the end of the days…
70 min
Working with the open source BIOS replacement and getting a…
51 min
Getting deeper into AVR programming
55 min
Open JTAG with Voltage Glitching
128 min
presenting the first German Team participating in the…
47 min
Doing tricks with a mobile phone
61 min
What has changed in DECT security after one year
52 min
hardware demo during the lecture
50 min
A practical guide to Differential Power Analysis
57 min
Hacking the Hackers with User-Space Virtualization