61 min
Internet reengineering session
58 min
From the Outside Looking In
29 min
The untold story of what really happened, how it was…
50 min
What went wrong, how the Internet reacted, what we can…
60 min
Und nichts (Secure) Bootet mehr?
32 min
Automatic detection of key-reuse vulnerabilities
55 min
Reverse Engineering Dead Protocols
58 min
Industrial System Ownership
61 min
Techniques for Chip Preparation
61 min
A Deep Technical Analysis
54 min
Do you care about Matroshka processors?
55 min
A gentle introduction to elliptic-curve cryptography
60 min
Gefahren von Kameras für (biometrische)…
61 min
... or how we battle the daemons of memory safety
60 min
You have a tracking device in your pocket
58 min
A Journey to Coax Out Chips' Inner Secrets
55 min
New Bleichenbacher Side Channels and Attacks
60 min
Piecing together the missing bits
63 min
Moving Beyond Single Points of Failure for Software…