26C3: Here be Dragons

Hacking

Full playlist: Video / Audio
Finding the key in the haystack
50 min

Finding the key in the haystack

A practical guide to Differential Power Analysis

Blackbox JTAG Reverse Engineering
56 min

Blackbox JTAG Reverse Engineering

Discovering what the hardware architects try to hide from…

secuBT
57 min

secuBT

Hacking the Hackers with User-Space Virtualization

Playing with the GSM RF Interface
47 min

Playing with the GSM RF Interface

Doing tricks with a mobile phone

DECT (part II)
61 min

DECT (part II)

What has changed in DECT security after one year

Reverse-Engineering DisplayLink devices
37 min

Reverse-Engineering DisplayLink devices

USB to DVI for Hackers

"Haste ma'n netblock?"
32 min

"Haste ma'n netblock?"

Layer 8 based IP Address hijacking in the end of the days…

Building a Debugger
55 min

Building a Debugger

Open JTAG with Voltage Glitching

Vier Fäuste für ein Halleluja
54 min

Vier Fäuste für ein Halleluja

Geschichten aus dem API-und Protokollkrieg von zwei…

Advanced microcontroller programming
51 min

Advanced microcontroller programming

Getting deeper into AVR programming

Defending the Poor
71 min

Defending the Poor

Preventing Flash Exploits

A part time scientists' perspective of getting to the moon
128 min

A part time scientists' perspective of getting to the moon

presenting the first German Team participating in the…

coreboot: Adding support for a system near you
70 min

coreboot: Adding support for a system near you

Working with the open source BIOS replacement and getting a…