35C3: Refreshing Memories

Security

Full playlist: Video / Audio
Kernel Tracing With eBPF
54 min

Kernel Tracing With eBPF

Unlocking God Mode on Linux

Sneaking In Network Security
60 min

Sneaking In Network Security

Enforcing strong network segmentation, without anyone…

Domain Name System
42 min

Domain Name System

Hierarchical decentralized naming system used since 30 years

Internet of Dongs
32 min

Internet of Dongs

A long way to a vibrant future

Web-based Cryptojacking in the Wild
39 min

Web-based Cryptojacking in the Wild

When your browser is mining coins for other people

Provable Security
59 min

Provable Security

How I learned to stop worrying and love the backdoor

Viva la Vita Vida
56 min

Viva la Vita Vida

Hacking the most secure handheld console

Attacking Chrome IPC
54 min

Attacking Chrome IPC

Reliably finding bugs to escape the Chrome sandbox

Enclosure-PUF
61 min

Enclosure-PUF

Tamper Proofing Commodity Hardware and other Applications

Self-encrypting deception
58 min

Self-encrypting deception

weaknesses in the encryption of solid state drives (SSDs)

Memsad
61 min

Memsad

why clearing memory is hard.

Smart Home - Smart Hack
51 min

Smart Home - Smart Hack

Wie der Weg ins digitale Zuhause zum Spaziergang wird

Wallet Security
35 min

Wallet Security

How (not) to protect private keys

The Layman's Guide to Zero-Day Engineering
57 min

The Layman's Guide to Zero-Day Engineering

A demystification of the exploit development lifecycle

A deep dive into the world of DOS viruses
38 min

A deep dive into the world of DOS viruses

Explaining in detail just how those little COM files…

Jailbreaking iOS
47 min

Jailbreaking iOS

From past to present

Attacking end-to-end email encryption
60 min

Attacking end-to-end email encryption

Efail, other attacks and lessons learned.

All Your Gesundheitsakten Are Belong To Us
61 min

All Your Gesundheitsakten Are Belong To Us

"So sicher wie beim Online-Banking": Die elektronische…

Inside the AMD Microcode ROM
37 min

Inside the AMD Microcode ROM

(Ab)Using AMD Microcode for fun and security

Modchips of the State
36 min

Modchips of the State

Hardware implants in the supply-chain

Venenerkennung hacken
39 min

Venenerkennung hacken

Vom Fall der letzten Bastion biometrischer Systeme

SD-WAN a New Hop
49 min

SD-WAN a New Hop

How to hack software defined network and keep your sanity?

What The Fax?!
46 min

What The Fax?!

Hacking your network likes it's 1980 again

SiliVaccine: North Korea's Weapon of Mass Detection
52 min

SiliVaccine: North Korea's Weapon of Mass Detection

How I Learned to Stop Worrying and Love the Backdoor

wallet.fail
61 min

wallet.fail

Hacking the most popular cryptocurrency hardware wallets