57 min
Vulnerabilities in the EMV Protocol
54 min
On Using Anonymizers and Still Get Fucked
39 min
implants, sensory extension and silicon - all for you!
50 min
Solutions for monitoring and lawful interception within a…
64 min
Why we will have more secure computers - tomorrow
60 min
Besitz und Wissen: Relay-Angriffe auf den neuen…
56 min
How we obtained the equivalent power of a Deep Crack for a…
55 min
Mitigating cold-boot attacks for Full-Disk-Encryption…
73 min
expanding the attack surface and then some
62 min
Attack Vectors Through the Eyes of Software-based Fault…
56 min
a dump of simple tools for embedded analysis at many layers
34 min
Nasty effects with tracker-less BitTorrent
57 min
What you didn't know about Acrobat
59 min
One year of Rocket Science!
58 min
Corporations enabling citizens to print digital money
51 min
3510 transistors in 60 minutes
76 min
SAP Security and the Enterprise
61 min
Introducing Project OsmocomBB
57 min
Improved approaches for auditive steganography
25 min
Source routing attacks applied to SIP
61 min
From analyzing to attacking mobile phones on a large scale.
66 min
all your baseband are belong to us
47 min
Backdooring Embedded Controllers
65 min
Applications of theorem proving for securing the windows…