Source routing attacks applied to SIP
Nasty effects with tracker-less BitTorrent
implants, sensory extension and silicon - all for you!
Backdooring Embedded Controllers
Solutions for monitoring and lawful interception within a…
3510 transistors in 60 minutes
On Using Anonymizers and Still Get Fucked
Mitigating cold-boot attacks for Full-Disk-Encryption…
a dump of simple tools for embedded analysis at many layers
How we obtained the equivalent power of a Deep Crack for a…
What you didn't know about Acrobat
Improved approaches for auditive steganography
Vulnerabilities in the EMV Protocol
Corporations enabling citizens to print digital money
One year of Rocket Science!
Besitz und Wissen: Relay-Angriffe auf den neuen…
Introducing Project OsmocomBB
From analyzing to attacking mobile phones on a large scale.
Attack Vectors Through the Eyes of Software-based Fault…
Why we will have more secure computers - tomorrow
Applications of theorem proving for securing the windows…
all your baseband are belong to us
expanding the attack surface and then some
SAP Security and the Enterprise