50 min
A practical guide to Differential Power Analysis
56 min
Discovering what the hardware architects try to hide from…
57 min
Hacking the Hackers with User-Space Virtualization
47 min
Doing tricks with a mobile phone
61 min
What has changed in DECT security after one year
57 min
Back to the good old Blue Box?
32 min
Layer 8 based IP Address hijacking in the end of the days…
55 min
Open JTAG with Voltage Glitching
54 min
Geschichten aus dem API-und Protokollkrieg von zwei…
51 min
Getting deeper into AVR programming
71 min
Preventing Flash Exploits
128 min
presenting the first German Team participating in the…
70 min
Working with the open source BIOS replacement and getting a…
52 min
hardware demo during the lecture