63 min
A gentle introduction to mobile messaging and subsequent…
60 min
How private companies leak your personal data into the…
37 min
A systemic update of sensitive information that you sniff…
64 min
Dissecting a Modern Wireless Network for the Internet of…
61 min
Improving the encrypted the web, one round-trip at a time
44 min
teaching a new dog old tricks
33 min
Intrusion and Exfiltration in Server-less Architectures
40 min
Call the frontdoor to install your backdoors
59 min
A tale of 3 different memory deduplication based…
64 min
(Not Only) Attacks on OAuth and OpenID Connect
29 min
Technical Teardown of the Pegasus malware and Trident…
30 min
The Red Pill of N26 Security
59 min
On the Privacy & Security of the Ultrasound Tracking…
61 min
A proposal for secure computing in an age where we cannot…
51 min
Secure Boot support in qemu, kvm and ovmf.
59 min
A Journey in the Land of (Cyber-)Espionage
55 min
Side effects include side-channel attacks and bypassing…
36 min
Analyzing Embedded OS Random Number Generators
59 min
Becoming a secret travel agent
46 min
Finding interesting targets in 128bit of entropy