
29 min
Building and Breaking Wireless Security
Wireless Physical Layer Security & More...

60 min
The plain simple reality of entropy
Or how I learned to stop worrying and love urandom

57 min
A Dozen Years of Shellphish
From DEFCON to the DARPA Cyber Grand Challenge

59 min
De-anonymizing Programmers
Large Scale Authorship Attribution from Executable Binaries…

60 min
Check your privileges!
How to drop more of your privileges to reduce attack…

60 min
Beyond Anti Evil Maid
Making it easier to avoid low-level compromise, and why…

43 min
Sanitizing PCAPs
Fun and games until someone uses IPv6 or TCP

60 min
Unpatchable
Living with a vulnerable implanted device

49 min
Dissecting VoLTE
Exploiting Free Data Channels and Security Problems

54 min
How hackers grind an MMORPG: by taking it apart!
An introduction to reverse engineering network protocols

60 min
The Perl Jam 2
The Camel Strikes Back

30 min
Rowhammer.js: Root privileges for web apps?
A tale of fault attacks on DRAM and attacks on CPU caches

60 min
APT Reports and OPSEC Evolution, or: These are not the APT reports you are looking for
How advanced threat actors learn and change with innovation…

72 min
Console Hacking
Breaking the 3DS

60 min
Shopshifting
The potential for payment system abuse

56 min
Running your own 3G/3.5G network
OpenBSC reloaded

60 min
Beyond your cable modem
How not to do DOCSIS networks

60 min
Windows drivers attack surface
some 'new' insights

49 min
Key-logger, Video, Mouse
How to turn your KVM into a raging key-logging monster

60 min
Hardware-Trojaner in Security-Chips
Eine Reise auf die dunkle Seite

58 min