32C3: gated communities

Security

Full playlist: Video / Audio
Building and Breaking Wireless Security
29 min

Building and Breaking Wireless Security

Wireless Physical Layer Security & More...

Rowhammer.js: Root privileges for web apps?
30 min

Rowhammer.js: Root privileges for web apps?

A tale of fault attacks on DRAM and attacks on CPU caches

Sanitizing PCAPs
43 min

Sanitizing PCAPs

Fun and games until someone uses IPv6 or TCP

Dissecting VoLTE
49 min

Dissecting VoLTE

Exploiting Free Data Channels and Security Problems

Key-logger, Video, Mouse
49 min

Key-logger, Video, Mouse

How to turn your KVM into a raging key-logging monster

How hackers grind an MMORPG: by taking it apart!
54 min

How hackers grind an MMORPG: by taking it apart!

An introduction to reverse engineering network protocols

Running your own 3G/3.5G network
56 min

Running your own 3G/3.5G network

OpenBSC reloaded

A Dozen Years of Shellphish
57 min

A Dozen Years of Shellphish

From DEFCON to the DARPA Cyber Grand Challenge

PLC-Blaster
58 min

PLC-Blaster

Ein Computerwurm für PLCs

De-anonymizing Programmers
59 min

De-anonymizing Programmers

Large Scale Authorship Attribution from Executable Binaries…

Shopshifting
60 min

Shopshifting

The potential for payment system abuse

Beyond your cable modem
60 min

Beyond your cable modem

How not to do DOCSIS networks

The plain simple reality of entropy
60 min

The plain simple reality of entropy

Or how I learned to stop worrying and love urandom

Hardware-Trojaner in Security-Chips
60 min

Hardware-Trojaner in Security-Chips

Eine Reise auf die dunkle Seite

The Perl Jam 2
60 min

The Perl Jam 2

The Camel Strikes Back

Unpatchable
60 min

Unpatchable

Living with a vulnerable implanted device

APT Reports and OPSEC Evolution, or: These are not  the APT reports you are looking for
60 min

APT Reports and OPSEC Evolution, or: These are not the APT reports you are looking for

How advanced threat actors learn and change with innovation…

Beyond Anti Evil Maid
60 min

Beyond Anti Evil Maid

Making it easier to avoid low-level compromise, and why…

Windows drivers attack surface
60 min

Windows drivers attack surface

some 'new' insights

Check your privileges!
60 min

Check your privileges!

How to drop more of your privileges to reduce attack…

PQCHacks
60 min

PQCHacks

A gentle introduction to post-quantum cryptography

CloudABI
62 min

CloudABI

Pure capability-based security for UNIX

Console Hacking
72 min

Console Hacking

Breaking the 3DS