
60 min
Beyond your cable modem
How not to do DOCSIS networks

60 min
Shopshifting
The potential for payment system abuse

60 min
Check your privileges!
How to drop more of your privileges to reduce attack…

29 min
Building and Breaking Wireless Security
Wireless Physical Layer Security & More...

72 min
Console Hacking
Breaking the 3DS

60 min
Hardware-Trojaner in Security-Chips
Eine Reise auf die dunkle Seite

54 min
How hackers grind an MMORPG: by taking it apart!
An introduction to reverse engineering network protocols

60 min
The Perl Jam 2
The Camel Strikes Back

60 min
Unpatchable
Living with a vulnerable implanted device

60 min
Beyond Anti Evil Maid
Making it easier to avoid low-level compromise, and why…

58 min
PLC-Blaster
Ein Computerwurm für PLCs

59 min
De-anonymizing Programmers
Large Scale Authorship Attribution from Executable Binaries…

60 min
APT Reports and OPSEC Evolution, or: These are not the APT reports you are looking for
How advanced threat actors learn and change with innovation…

49 min
Key-logger, Video, Mouse
How to turn your KVM into a raging key-logging monster

30 min
Rowhammer.js: Root privileges for web apps?
A tale of fault attacks on DRAM and attacks on CPU caches

57 min
A Dozen Years of Shellphish
From DEFCON to the DARPA Cyber Grand Challenge

60 min
The plain simple reality of entropy
Or how I learned to stop worrying and love urandom

49 min
Dissecting VoLTE
Exploiting Free Data Channels and Security Problems

56 min
Running your own 3G/3.5G network
OpenBSC reloaded

60 min
Windows drivers attack surface
some 'new' insights

43 min