Solutions for monitoring and lawful interception within a…
implants, sensory extension and silicon - all for you!
What you didn't know about Acrobat
Mitigating cold-boot attacks for Full-Disk-Encryption…
Source routing attacks applied to SIP
Corporations enabling citizens to print digital money
Vulnerabilities in the EMV Protocol
Applications of theorem proving for securing the windows…
Introducing Project OsmocomBB
One year of Rocket Science!
3510 transistors in 60 minutes
Backdooring Embedded Controllers
How we obtained the equivalent power of a Deep Crack for a…
Attack Vectors Through the Eyes of Software-based Fault…
Nasty effects with tracker-less BitTorrent
Why we will have more secure computers - tomorrow
Improved approaches for auditive steganography
all your baseband are belong to us
From analyzing to attacking mobile phones on a large scale.
On Using Anonymizers and Still Get Fucked
expanding the attack surface and then some
SAP Security and the Enterprise
Besitz und Wissen: Relay-Angriffe auf den neuen…
a dump of simple tools for embedded analysis at many layers