
31 min
TrustZone is not enough
Hijacking debug components for embedded security

45 min
SCADA - Gateway to (s)hell
Hacking industrial control gateways

60 min
MQA - A clever stealth DRM-Trojan
A critical look on a new audio Format

58 min
Decoding Contactless (Card) Payments
An Exploration of NFC Transactions and Explanation How…

58 min
Are all BSDs created equally?
A survey of BSD kernel vulnerabilities.

56 min
Console Security - Switch
Homebrew on the Horizon

44 min
ASLR on the line
Practical cache attacks on the MMU

65 min
LatticeHacks
Fun with lattices in cryptography and cryptanalysis

51 min
Uncovering vulnerabilities in Hoermann BiSecur
An AES encrypted radio system

51 min
How to drift with any car
(without your mom yelling at you)

46 min
Taking a scalpel to QNX
Analyzing & Breaking Exploit Mitigations and Secure Random…

59 min
We should share our secrets
Shamir secret sharing: How it works and how to implement it

49 min
Electromagnetic Threats for Information Security
Ways to Chaos in Digital and Analogue Electronics

57 min
Everything you want to know about x86 microcode, but might have been afraid to ask
An introduction into reverse-engineering x86 microcode and…

56 min
eMMC hacking, or: how I fixed long-dead Galaxy S3 phones
A journey on how to fix broken proprietary hardware by…

60 min
Lets break modern binary code obfuscation
A semantics based approach

31 min
DPRK Consumer Technology
Facts to fight lore

22 min
Doping your Fitbit
On Fitbit Firmware Modifications and Data Extraction

52 min