29 min
Wireless Physical Layer Security & More...
30 min
A tale of fault attacks on DRAM and attacks on CPU caches
43 min
Fun and games until someone uses IPv6 or TCP
49 min
Exploiting Free Data Channels and Security Problems
49 min
How to turn your KVM into a raging key-logging monster
54 min
An introduction to reverse engineering network protocols
57 min
From DEFCON to the DARPA Cyber Grand Challenge
58 min
Ein Computerwurm für PLCs
59 min
Large Scale Authorship Attribution from Executable Binaries…
60 min
Or how I learned to stop worrying and love urandom
60 min
Eine Reise auf die dunkle Seite
60 min
The potential for payment system abuse
60 min
How not to do DOCSIS networks
60 min
Living with a vulnerable implanted device
60 min
How advanced threat actors learn and change with innovation…
60 min
Making it easier to avoid low-level compromise, and why…
60 min
How to drop more of your privileges to reduce attack…
60 min
A gentle introduction to post-quantum cryptography
62 min
Pure capability-based security for UNIX