35C3: Refreshing Memories

Security

Full playlist: Video / Audio
Smart Home - Smart Hack
51 min

Smart Home - Smart Hack

Wie der Weg ins digitale Zuhause zum Spaziergang wird

wallet.fail
61 min

wallet.fail

Hacking the most popular cryptocurrency hardware wallets

What The Fax?!
46 min

What The Fax?!

Hacking your network likes it's 1980 again

Venenerkennung hacken
39 min

Venenerkennung hacken

Vom Fall der letzten Bastion biometrischer Systeme

All Your Gesundheitsakten Are Belong To Us
61 min

All Your Gesundheitsakten Are Belong To Us

"So sicher wie beim Online-Banking": Die elektronische…

Inside the AMD Microcode ROM
37 min

Inside the AMD Microcode ROM

(Ab)Using AMD Microcode for fun and security

SiliVaccine: North Korea's Weapon of Mass Detection
52 min

SiliVaccine: North Korea's Weapon of Mass Detection

How I Learned to Stop Worrying and Love the Backdoor

Internet of Dongs
32 min

Internet of Dongs

A long way to a vibrant future

A deep dive into the world of DOS viruses
38 min

A deep dive into the world of DOS viruses

Explaining in detail just how those little COM files…

Attacking end-to-end email encryption
60 min

Attacking end-to-end email encryption

Efail, other attacks and lessons learned.

Viva la Vita Vida
56 min

Viva la Vita Vida

Hacking the most secure handheld console

Modchips of the State
36 min

Modchips of the State

Hardware implants in the supply-chain

Attacking Chrome IPC
54 min

Attacking Chrome IPC

Reliably finding bugs to escape the Chrome sandbox

Memsad
61 min

Memsad

why clearing memory is hard.

Jailbreaking iOS
47 min

Jailbreaking iOS

From past to present

The Layman's Guide to Zero-Day Engineering
57 min

The Layman's Guide to Zero-Day Engineering

A demystification of the exploit development lifecycle

Sneaking In Network Security
60 min

Sneaking In Network Security

Enforcing strong network segmentation, without anyone…

Self-encrypting deception
58 min

Self-encrypting deception

weaknesses in the encryption of solid state drives (SSDs)

Kernel Tracing With eBPF
54 min

Kernel Tracing With eBPF

Unlocking God Mode on Linux

SD-WAN a New Hop
49 min

SD-WAN a New Hop

How to hack software defined network and keep your sanity?

Web-based Cryptojacking in the Wild
39 min

Web-based Cryptojacking in the Wild

When your browser is mining coins for other people

Wallet Security
35 min

Wallet Security

How (not) to protect private keys

Domain Name System
42 min

Domain Name System

Hierarchical decentralized naming system used since 30 years

Provable Security
59 min

Provable Security

How I learned to stop worrying and love the backdoor

Enclosure-PUF
61 min

Enclosure-PUF

Tamper Proofing Commodity Hardware and other Applications