58 min
What You Get When Attack iPhones of Researchers
41 min
Recovering Critical Data from Tesla Autopilot Using Voltage…
63 min
TETRA unlocked after decades in the shadows
41 min
Security Of Railway Communication Protocols
36 min
Hardware hacking tooling for the new iPhone generation
36 min
A deep dive into an underrepresented research area
40 min
Decrypting files hijacked by the "second most used…
54 min
Über „Girodays“ & anderen Kuriositäten
40 min
Advanced QEMU-based fuzzing
62 min
Wie man Stalkerware und Staatstrojaner auf Smartphones…
42 min
Real-world exploits and mitigations in Large Language Model…
38 min
Uncovering fake base stations on iOS devices
42 min
Finishing off the Nintendo DSi
39 min
The cybersecurity dark side of solar energy when clouds are…
59 min
Breaking and fixing the Bluetooth standard. One More Time.
38 min
Aarch64 binary rewriting adventures but mostly pains