Solutions for monitoring and lawful interception within a…
implants, sensory extension and silicon - all for you!
What you didn't know about Acrobat
Mitigating cold-boot attacks for Full-Disk-Encryption…
Introducing Project OsmocomBB
Vulnerabilities in the EMV Protocol
Corporations enabling citizens to print digital money
Applications of theorem proving for securing the windows…
Source routing attacks applied to SIP
One year of Rocket Science!
How we obtained the equivalent power of a Deep Crack for a…
Nasty effects with tracker-less BitTorrent
Backdooring Embedded Controllers
Improved approaches for auditive steganography
Attack Vectors Through the Eyes of Software-based Fault…
3510 transistors in 60 minutes
Why we will have more secure computers - tomorrow
all your baseband are belong to us
SAP Security and the Enterprise
On Using Anonymizers and Still Get Fucked
expanding the attack surface and then some
From analyzing to attacking mobile phones on a large scale.
a dump of simple tools for embedded analysis at many layers
Besitz und Wissen: Relay-Angriffe auf den neuen…