33C3: works for me

Security

Full playlist: Video / Audio
Shut Up and Take My Money!
30 min

Shut Up and Take My Money!

The Red Pill of N26 Security

Console Hacking 2016
53 min

Console Hacking 2016

PS4: PC Master Race

Decoding the LoRa PHY
64 min

Decoding the LoRa PHY

Dissecting a Modern Wireless Network for the Internet of…

Where in the World Is Carmen Sandiego?
59 min

Where in the World Is Carmen Sandiego?

Becoming a secret travel agent

Build your own NSA
60 min

Build your own NSA

How private companies leak your personal data into the…

Gone in 60 Milliseconds
33 min

Gone in 60 Milliseconds

Intrusion and Exfiltration in Server-less Architectures

Nintendo Hacking 2016
61 min

Nintendo Hacking 2016

Game Over

A look into the Mobile Messaging Black Box
63 min

A look into the Mobile Messaging Black Box

A gentle introduction to mobile messaging and subsequent…

Talking Behind Your Back
59 min

Talking Behind Your Back

On the Privacy & Security of the Ultrasound Tracking…

Deploying TLS 1.3: the great, the good and the bad
61 min

Deploying TLS 1.3: the great, the good and the bad

Improving the encrypted the web, one round-trip at a time

What could possibly go wrong with <insert x86 instruction here>?
55 min

What could possibly go wrong with <insert x86 instruction here>?

Side effects include side-channel attacks and bypassing…

Exploiting PHP7 unserialize
44 min

Exploiting PHP7 unserialize

teaching a new dog old tricks

radare demystified
62 min

radare demystified

after 1.0

You can -j REJECT but you can not hide: Global scanning of the IPv6 Internet
46 min

You can -j REJECT but you can not hide: Global scanning of the IPv6 Internet

Finding interesting targets in 128bit of entropy

Pegasus internals
29 min

Pegasus internals

Technical Teardown of the Pegasus malware and Trident…

Memory Deduplication: The Curse that Keeps on Giving
59 min

Memory Deduplication: The Curse that Keeps on Giving

A tale of 3 different memory deduplication based…

Visiting The Bear Den
59 min

Visiting The Bear Den

A Journey in the Land of (Cyber-)Espionage

Intercoms Hacking
40 min

Intercoms Hacking

Call the frontdoor to install your backdoors

Virtual Secure Boot
51 min

Virtual Secure Boot

Secure Boot support in qemu, kvm and ovmf.

The DROWN Attack
55 min

The DROWN Attack

Breaking TLS using SSLv2

On the Security and Privacy of Modern Single Sign-On in the Web
64 min

On the Security and Privacy of Modern Single Sign-On in the Web

(Not Only) Attacks on OAuth and OpenID Connect

Untrusting the CPU
61 min

Untrusting the CPU

A proposal for secure computing in an age where we cannot…

Wheel of Fortune
36 min

Wheel of Fortune

Analyzing Embedded OS Random Number Generators

Code BROWN in the Air
37 min

Code BROWN in the Air

A systemic update of sensitive information that you sniff…