51 min
3510 transistors in 60 minutes
57 min
What you didn't know about Acrobat
60 min
Besitz und Wissen: Relay-Angriffe auf den neuen…
39 min
implants, sensory extension and silicon - all for you!
56 min
a dump of simple tools for embedded analysis at many layers
61 min
Introducing Project OsmocomBB
58 min
Corporations enabling citizens to print digital money
61 min
From analyzing to attacking mobile phones on a large scale.
66 min
all your baseband are belong to us
57 min
Vulnerabilities in the EMV Protocol
47 min
Backdooring Embedded Controllers
64 min
Why we will have more secure computers - tomorrow
73 min
expanding the attack surface and then some
56 min
How we obtained the equivalent power of a Deep Crack for a…
76 min
SAP Security and the Enterprise
59 min
One year of Rocket Science!
54 min
On Using Anonymizers and Still Get Fucked
34 min
Nasty effects with tracker-less BitTorrent
50 min
Solutions for monitoring and lawful interception within a…
62 min
Attack Vectors Through the Eyes of Software-based Fault…
25 min
Source routing attacks applied to SIP
57 min
Improved approaches for auditive steganography
55 min
Mitigating cold-boot attacks for Full-Disk-Encryption…
65 min
Applications of theorem proving for securing the windows…