36C3: Resource Exhaustion

Security

Full playlist: Video / Audio
15 Jahre deutsche Telematikinfrastruktur (TI)
41 min

15 Jahre deutsche Telematikinfrastruktur (TI)

Die Realität beim Arztbesuch nach 15 Jahren Entwicklung…

Hirne Hacken
43 min

Hirne Hacken

Menschliche Faktoren der IT-Sicherheit

Hacking (with) a TPM
37 min

Hacking (with) a TPM

Don't ask what you can do for TPMs, Ask what TPMs can do…

Boot2root
62 min

Boot2root

Auditing Boot Loaders by Example

Cryptography demystified
53 min

Cryptography demystified

An introduction without maths

ZombieLoad Attack
55 min

ZombieLoad Attack

Leaking Your Recent Memory Operations on Intel CPUs

Vehicle immobilization revisited
55 min

Vehicle immobilization revisited

Uncovering and assessing a second authentication mechanism…

Don't Ruck Us Too Hard - Owning Ruckus AP Devices
48 min

Don't Ruck Us Too Hard - Owning Ruckus AP Devices

3 different RCE vulnerabilities on Ruckus Wireless access…

Harry Potter and the Not-So-Smart Proxy War
35 min

Harry Potter and the Not-So-Smart Proxy War

Taking a look at a covert CIA virtual fencing solution

Das nützlich-unbedenklich Spektrum
63 min

Das nützlich-unbedenklich Spektrum

Können wir Software bauen, die nützlich /und/ unbedenklich…

TamaGo - bare metal Go framework for ARM SoCs.
59 min

TamaGo - bare metal Go framework for ARM SoCs.

Reducing the attack surface with pure embedded Go.

SigOver + alpha
55 min

SigOver + alpha

Signal overshadowing attack on LTE and its applications

On the insecure nature of turbine control systems in power generation
60 min

On the insecure nature of turbine control systems in power generation

A security study of turbine control systems in power…

SELECT code_execution FROM * USING SQLite;
46 min

SELECT code_execution FROM * USING SQLite;

--Gaining code execution using a malicious SQLite database

The Great Escape of ESXi
40 min

The Great Escape of ESXi

Breaking Out of a Sandboxed Virtual Machine

Intel Management Engine deep dive
60 min

Intel Management Engine deep dive

Understanding the ME at the OS and hardware level

How to Break PDFs
58 min

How to Break PDFs

Breaking PDF Encryption and PDF Signatures

It's not safe on the streets... especially for your 3DS!
46 min

It's not safe on the streets... especially for your 3DS!

Exploring a new attack surface on the 3DS

Tales of old: untethering iOS 11
39 min

Tales of old: untethering iOS 11

Spoiler: Apple is bad at patching

Leaving legacy behind
52 min

Leaving legacy behind

Reducing carbon footprint of network services with MirageOS…