32C3: gated communities

Security

Full playlist: Video / Audio
Building and Breaking Wireless Security
29 min

Building and Breaking Wireless Security

Wireless Physical Layer Security & More...

The plain simple reality of entropy
60 min

The plain simple reality of entropy

Or how I learned to stop worrying and love urandom

A Dozen Years of Shellphish
57 min

A Dozen Years of Shellphish

From DEFCON to the DARPA Cyber Grand Challenge

De-anonymizing Programmers
59 min

De-anonymizing Programmers

Large Scale Authorship Attribution from Executable Binaries…

Check your privileges!
60 min

Check your privileges!

How to drop more of your privileges to reduce attack…

Beyond Anti Evil Maid
60 min

Beyond Anti Evil Maid

Making it easier to avoid low-level compromise, and why…

Sanitizing PCAPs
43 min

Sanitizing PCAPs

Fun and games until someone uses IPv6 or TCP

Unpatchable
60 min

Unpatchable

Living with a vulnerable implanted device

How hackers grind an MMORPG: by taking it apart!
54 min

How hackers grind an MMORPG: by taking it apart!

An introduction to reverse engineering network protocols

Dissecting VoLTE
49 min

Dissecting VoLTE

Exploiting Free Data Channels and Security Problems

The Perl Jam 2
60 min

The Perl Jam 2

The Camel Strikes Back

Rowhammer.js: Root privileges for web apps?
30 min

Rowhammer.js: Root privileges for web apps?

A tale of fault attacks on DRAM and attacks on CPU caches

CloudABI
62 min

CloudABI

Pure capability-based security for UNIX

APT Reports and OPSEC Evolution, or: These are not  the APT reports you are looking for
60 min

APT Reports and OPSEC Evolution, or: These are not the APT reports you are looking for

How advanced threat actors learn and change with innovation…

Console Hacking
72 min

Console Hacking

Breaking the 3DS

PQCHacks
60 min

PQCHacks

A gentle introduction to post-quantum cryptography

Shopshifting
60 min

Shopshifting

The potential for payment system abuse

Running your own 3G/3.5G network
56 min

Running your own 3G/3.5G network

OpenBSC reloaded

Beyond your cable modem
60 min

Beyond your cable modem

How not to do DOCSIS networks

Windows drivers attack surface
60 min

Windows drivers attack surface

some 'new' insights

Key-logger, Video, Mouse
49 min

Key-logger, Video, Mouse

How to turn your KVM into a raging key-logging monster

Hardware-Trojaner in Security-Chips
60 min

Hardware-Trojaner in Security-Chips

Eine Reise auf die dunkle Seite

PLC-Blaster
58 min

PLC-Blaster

Ein Computerwurm für PLCs