60 min
How not to do DOCSIS networks
60 min
The potential for payment system abuse
60 min
How to drop more of your privileges to reduce attack…
29 min
Wireless Physical Layer Security & More...
60 min
Eine Reise auf die dunkle Seite
54 min
An introduction to reverse engineering network protocols
60 min
Living with a vulnerable implanted device
60 min
Making it easier to avoid low-level compromise, and why…
58 min
Ein Computerwurm für PLCs
59 min
Large Scale Authorship Attribution from Executable Binaries…
60 min
How advanced threat actors learn and change with innovation…
49 min
How to turn your KVM into a raging key-logging monster
30 min
A tale of fault attacks on DRAM and attacks on CPU caches
57 min
From DEFCON to the DARPA Cyber Grand Challenge
60 min
Or how I learned to stop worrying and love urandom
49 min
Exploiting Free Data Channels and Security Problems
60 min
A gentle introduction to post-quantum cryptography
62 min
Pure capability-based security for UNIX
43 min
Fun and games until someone uses IPv6 or TCP