continue…
Related to
BootStomp: On the Security of Bootloaders in Mobile Devices
Defeating (Not)Petya's Cryptography
54 min
Microarchitectural Attacks on Trusted Execution…
55 min
KRACKing WPA2 by Forcing Nonce Reuse
61 min