58 min
Are all BSDs created equally?
A survey of BSD kernel vulnerabilities.
44 min
ASLR on the line
Practical cache attacks on the MMU
56 min
Console Security - Switch
Homebrew on the Horizon
58 min
Decoding Contactless (Card) Payments
An Exploration of NFC Transactions and Explanation How…
22 min
Doping your Fitbit
On Fitbit Firmware Modifications and Data Extraction
31 min
DPRK Consumer Technology
Facts to fight lore
49 min
Electromagnetic Threats for Information Security
Ways to Chaos in Digital and Analogue Electronics
56 min
eMMC hacking, or: how I fixed long-dead Galaxy S3 phones
A journey on how to fix broken proprietary hardware by…
57 min
Everything you want to know about x86 microcode, but might have been afraid to ask
An introduction into reverse-engineering x86 microcode and…
51 min
How to drift with any car
(without your mom yelling at you)
52 min
Ladeinfrastruktur für Elektroautos: Ausbau statt Sicherheit
Warum das Laden eines Elektroautos unsicher ist
65 min
LatticeHacks
Fun with lattices in cryptography and cryptanalysis
60 min
Lets break modern binary code obfuscation
A semantics based approach
45 min
SCADA - Gateway to (s)hell
Hacking industrial control gateways
46 min
Taking a scalpel to QNX
Analyzing & Breaking Exploit Mitigations and Secure Random…
31 min
TrustZone is not enough
Hijacking debug components for embedded security
51 min
Uncovering vulnerabilities in Hoermann BiSecur
An AES encrypted radio system
59 min