29 min
Wireless Physical Layer Security & More...
60 min
Or how I learned to stop worrying and love urandom
57 min
From DEFCON to the DARPA Cyber Grand Challenge
59 min
Large Scale Authorship Attribution from Executable Binaries…
60 min
How to drop more of your privileges to reduce attack…
60 min
Making it easier to avoid low-level compromise, and why…
43 min
Fun and games until someone uses IPv6 or TCP
60 min
Living with a vulnerable implanted device
54 min
An introduction to reverse engineering network protocols
49 min
Exploiting Free Data Channels and Security Problems
30 min
A tale of fault attacks on DRAM and attacks on CPU caches
62 min
Pure capability-based security for UNIX
60 min
How advanced threat actors learn and change with innovation…
60 min
A gentle introduction to post-quantum cryptography
60 min
The potential for payment system abuse
60 min
How not to do DOCSIS networks
49 min
How to turn your KVM into a raging key-logging monster
60 min
Eine Reise auf die dunkle Seite
58 min
Ein Computerwurm für PLCs