34C3: TUWAT

Security

Full playlist: Video / Audio
Ladeinfrastruktur für Elektroautos: Ausbau statt Sicherheit
52 min

Ladeinfrastruktur für Elektroautos: Ausbau statt Sicherheit

Warum das Laden eines Elektroautos unsicher ist

Console Security - Switch
56 min

Console Security - Switch

Homebrew on the Horizon

Everything you want to know about x86 microcode, but might have been afraid to ask
57 min

Everything you want to know about x86 microcode, but might have been afraid to ask

An introduction into reverse-engineering x86 microcode and…

How to drift with any car
51 min

How to drift with any car

(without your mom yelling at you)

Doping your Fitbit
22 min

Doping your Fitbit

On Fitbit Firmware Modifications and Data Extraction

Are all BSDs created equally?
58 min

Are all BSDs created equally?

A survey of BSD kernel vulnerabilities.

SCADA - Gateway to (s)hell
45 min

SCADA - Gateway to (s)hell

Hacking industrial control gateways

DPRK Consumer Technology
31 min

DPRK Consumer Technology

Facts to fight lore

Decoding Contactless (Card) Payments
58 min

Decoding Contactless (Card) Payments

An Exploration of NFC Transactions and Explanation How…

LatticeHacks
65 min

LatticeHacks

Fun with lattices in cryptography and cryptanalysis

eMMC hacking, or: how I fixed long-dead Galaxy S3 phones
56 min

eMMC hacking, or: how I fixed long-dead Galaxy S3 phones

A journey on how to fix broken proprietary hardware by…

Lets break modern binary code obfuscation
60 min

Lets break modern binary code obfuscation

A semantics based approach

ASLR on the line
44 min

ASLR on the line

Practical cache attacks on the MMU

MQA - A clever stealth DRM-Trojan
60 min

MQA - A clever stealth DRM-Trojan

A critical look on a new audio Format

avatar²
55 min

avatar²

Towards an open source binary firmware analysis framework

Electromagnetic Threats for Information Security
49 min

Electromagnetic Threats for Information Security

Ways to Chaos in Digital and Analogue Electronics

We should share our secrets
59 min

We should share our secrets

Shamir secret sharing: How it works and how to implement it

Taking a scalpel to QNX
46 min

Taking a scalpel to QNX

Analyzing & Breaking Exploit Mitigations and Secure Random…

TrustZone is not enough
31 min

TrustZone is not enough

Hijacking debug components for embedded security