57 min
From DEFCON to the DARPA Cyber Grand Challenge
60 min
How advanced threat actors learn and change with innovation…
60 min
Making it easier to avoid low-level compromise, and why…
60 min
How not to do DOCSIS networks
29 min
Wireless Physical Layer Security & More...
60 min
How to drop more of your privileges to reduce attack…
62 min
Pure capability-based security for UNIX
59 min
Large Scale Authorship Attribution from Executable Binaries…
49 min
Exploiting Free Data Channels and Security Problems
60 min
Eine Reise auf die dunkle Seite
54 min
An introduction to reverse engineering network protocols
49 min
How to turn your KVM into a raging key-logging monster
58 min
Ein Computerwurm für PLCs
60 min
A gentle introduction to post-quantum cryptography
30 min
A tale of fault attacks on DRAM and attacks on CPU caches
43 min
Fun and games until someone uses IPv6 or TCP
60 min
The potential for payment system abuse
60 min
Or how I learned to stop worrying and love urandom
60 min
Living with a vulnerable implanted device