Vulnerabilities in the EMV Protocol
On Using Anonymizers and Still Get Fucked
implants, sensory extension and silicon - all for you!
Solutions for monitoring and lawful interception within a…
Why we will have more secure computers - tomorrow
Besitz und Wissen: Relay-Angriffe auf den neuen…
How we obtained the equivalent power of a Deep Crack for a…
Mitigating cold-boot attacks for Full-Disk-Encryption…
expanding the attack surface and then some
Attack Vectors Through the Eyes of Software-based Fault…
a dump of simple tools for embedded analysis at many layers
Nasty effects with tracker-less BitTorrent
What you didn't know about Acrobat
One year of Rocket Science!
Corporations enabling citizens to print digital money
3510 transistors in 60 minutes
SAP Security and the Enterprise
Introducing Project OsmocomBB
Improved approaches for auditive steganography
Source routing attacks applied to SIP
From analyzing to attacking mobile phones on a large scale.
all your baseband are belong to us
Backdooring Embedded Controllers
Applications of theorem proving for securing the windows…