29 min
Building and Breaking Wireless Security
Wireless Physical Layer Security & More...
30 min
Rowhammer.js: Root privileges for web apps?
A tale of fault attacks on DRAM and attacks on CPU caches
43 min
Sanitizing PCAPs
Fun and games until someone uses IPv6 or TCP
49 min
Dissecting VoLTE
Exploiting Free Data Channels and Security Problems
49 min
Key-logger, Video, Mouse
How to turn your KVM into a raging key-logging monster
54 min
How hackers grind an MMORPG: by taking it apart!
An introduction to reverse engineering network protocols
56 min
Running your own 3G/3.5G network
OpenBSC reloaded
57 min
A Dozen Years of Shellphish
From DEFCON to the DARPA Cyber Grand Challenge
58 min
PLC-Blaster
Ein Computerwurm für PLCs
59 min
De-anonymizing Programmers
Large Scale Authorship Attribution from Executable Binaries…
60 min
Beyond your cable modem
How not to do DOCSIS networks
60 min
Hardware-Trojaner in Security-Chips
Eine Reise auf die dunkle Seite
60 min
The Perl Jam 2
The Camel Strikes Back
60 min
Shopshifting
The potential for payment system abuse
60 min
The plain simple reality of entropy
Or how I learned to stop worrying and love urandom
60 min
Unpatchable
Living with a vulnerable implanted device
60 min
APT Reports and OPSEC Evolution, or: These are not the APT reports you are looking for
How advanced threat actors learn and change with innovation…
60 min
Beyond Anti Evil Maid
Making it easier to avoid low-level compromise, and why…
60 min
Windows drivers attack surface
some 'new' insights
60 min
Check your privileges!
How to drop more of your privileges to reduce attack…
72 min