32C3: gated communities

Security

Full playlist: Video / Audio
A Dozen Years of Shellphish
57 min

A Dozen Years of Shellphish

From DEFCON to the DARPA Cyber Grand Challenge

APT Reports and OPSEC Evolution, or: These are not  the APT reports you are looking for
60 min

APT Reports and OPSEC Evolution, or: These are not the APT reports you are looking for

How advanced threat actors learn and change with innovation…

Beyond Anti Evil Maid
60 min

Beyond Anti Evil Maid

Making it easier to avoid low-level compromise, and why…

Beyond your cable modem
60 min

Beyond your cable modem

How not to do DOCSIS networks

Building and Breaking Wireless Security
29 min

Building and Breaking Wireless Security

Wireless Physical Layer Security & More...

Check your privileges!
60 min

Check your privileges!

How to drop more of your privileges to reduce attack…

CloudABI
62 min

CloudABI

Pure capability-based security for UNIX

Console Hacking
72 min

Console Hacking

Breaking the 3DS

De-anonymizing Programmers
59 min

De-anonymizing Programmers

Large Scale Authorship Attribution from Executable Binaries…

Dissecting VoLTE
49 min

Dissecting VoLTE

Exploiting Free Data Channels and Security Problems

Hardware-Trojaner in Security-Chips
60 min

Hardware-Trojaner in Security-Chips

Eine Reise auf die dunkle Seite

How hackers grind an MMORPG: by taking it apart!
54 min

How hackers grind an MMORPG: by taking it apart!

An introduction to reverse engineering network protocols

Key-logger, Video, Mouse
49 min

Key-logger, Video, Mouse

How to turn your KVM into a raging key-logging monster

PLC-Blaster
58 min

PLC-Blaster

Ein Computerwurm für PLCs

PQCHacks
60 min

PQCHacks

A gentle introduction to post-quantum cryptography

Rowhammer.js: Root privileges for web apps?
30 min

Rowhammer.js: Root privileges for web apps?

A tale of fault attacks on DRAM and attacks on CPU caches

Running your own 3G/3.5G network
56 min

Running your own 3G/3.5G network

OpenBSC reloaded

Sanitizing PCAPs
43 min

Sanitizing PCAPs

Fun and games until someone uses IPv6 or TCP

Shopshifting
60 min

Shopshifting

The potential for payment system abuse

The Perl Jam 2
60 min

The Perl Jam 2

The Camel Strikes Back

The plain simple reality of entropy
60 min

The plain simple reality of entropy

Or how I learned to stop worrying and love urandom

Unpatchable
60 min

Unpatchable

Living with a vulnerable implanted device

Windows drivers attack surface
60 min

Windows drivers attack surface

some 'new' insights