36C3: Resource Exhaustion

Security

Full playlist: Video / Audio
Hirne Hacken
43 min

Hirne Hacken

Menschliche Faktoren der IT-Sicherheit

Das nützlich-unbedenklich Spektrum
63 min

Das nützlich-unbedenklich Spektrum

Können wir Software bauen, die nützlich /und/ unbedenklich…

Leaving legacy behind
52 min

Leaving legacy behind

Reducing carbon footprint of network services with MirageOS…

Tales of old: untethering iOS 11
39 min

Tales of old: untethering iOS 11

Spoiler: Apple is bad at patching

SELECT code_execution FROM * USING SQLite;
46 min

SELECT code_execution FROM * USING SQLite;

--Gaining code execution using a malicious SQLite database

Harry Potter and the Not-So-Smart Proxy War
35 min

Harry Potter and the Not-So-Smart Proxy War

Taking a look at a covert CIA virtual fencing solution

How to Break PDFs
58 min

How to Break PDFs

Breaking PDF Encryption and PDF Signatures

Intel Management Engine deep dive
60 min

Intel Management Engine deep dive

Understanding the ME at the OS and hardware level

The Great Escape of ESXi
40 min

The Great Escape of ESXi

Breaking Out of a Sandboxed Virtual Machine

On the insecure nature of turbine control systems in power generation
60 min

On the insecure nature of turbine control systems in power generation

A security study of turbine control systems in power…

15 Jahre deutsche Telematikinfrastruktur (TI)
41 min

15 Jahre deutsche Telematikinfrastruktur (TI)

Die Realität beim Arztbesuch nach 15 Jahren Entwicklung…

It's not safe on the streets... especially for your 3DS!
46 min

It's not safe on the streets... especially for your 3DS!

Exploring a new attack surface on the 3DS

Cryptography demystified
53 min

Cryptography demystified

An introduction without maths

Hacking (with) a TPM
37 min

Hacking (with) a TPM

Don't ask what you can do for TPMs, Ask what TPMs can do…

Boot2root
62 min

Boot2root

Auditing Boot Loaders by Example

Vehicle immobilization revisited
55 min

Vehicle immobilization revisited

Uncovering and assessing a second authentication mechanism…

ZombieLoad Attack
55 min

ZombieLoad Attack

Leaking Your Recent Memory Operations on Intel CPUs

TamaGo - bare metal Go framework for ARM SoCs.
59 min

TamaGo - bare metal Go framework for ARM SoCs.

Reducing the attack surface with pure embedded Go.

Don't Ruck Us Too Hard - Owning Ruckus AP Devices
48 min

Don't Ruck Us Too Hard - Owning Ruckus AP Devices

3 different RCE vulnerabilities on Ruckus Wireless access…

SigOver + alpha
55 min

SigOver + alpha

Signal overshadowing attack on LTE and its applications