
38 min
A deep dive into the world of DOS viruses
Explaining in detail just how those little COM files…

61 min
All Your Gesundheitsakten Are Belong To Us
"So sicher wie beim Online-Banking": Die elektronische…

54 min
Attacking Chrome IPC
Reliably finding bugs to escape the Chrome sandbox

60 min
Attacking end-to-end email encryption
Efail, other attacks and lessons learned.

42 min
Domain Name System
Hierarchical decentralized naming system used since 30 years

57 min
Du kannst alles hacken – du darfst dich nur nicht erwischen lassen.
OpSec für Datenreisende

61 min
Enclosure-PUF
Tamper Proofing Commodity Hardware and other Applications

37 min
Inside the AMD Microcode ROM
(Ab)Using AMD Microcode for fun and security

32 min
Internet of Dongs
A long way to a vibrant future

47 min
Jailbreaking iOS
From past to present

54 min
Kernel Tracing With eBPF
Unlocking God Mode on Linux

36 min
Modchips of the State
Hardware implants in the supply-chain

59 min
Provable Security
How I learned to stop worrying and love the backdoor

49 min
SD-WAN a New Hop
How to hack software defined network and keep your sanity?

58 min
Self-encrypting deception
weaknesses in the encryption of solid state drives (SSDs)

52 min
SiliVaccine: North Korea's Weapon of Mass Detection
How I Learned to Stop Worrying and Love the Backdoor

51 min
Smart Home - Smart Hack
Wie der Weg ins digitale Zuhause zum Spaziergang wird

60 min
Sneaking In Network Security
Enforcing strong network segmentation, without anyone…

57 min
The Layman's Guide to Zero-Day Engineering
A demystification of the exploit development lifecycle

39 min
Venenerkennung hacken
Vom Fall der letzten Bastion biometrischer Systeme

56 min
Viva la Vita Vida
Hacking the most secure handheld console

61 min
wallet.fail
Hacking the most popular cryptocurrency hardware wallets

35 min
Wallet Security
How (not) to protect private keys

39 min
Web-based Cryptojacking in the Wild
When your browser is mining coins for other people

46 min