Search for "SS7"

What could possibly go wrong with <insert x86 instruction here>?
55 min

What could possibly go wrong with <insert x86 instruction here>?

Side effects include side-channel attacks and bypassing…

Mastering the Maze
20 min

Mastering the Maze

Unleashing Reinforcement Learning in Penetration Testing…

Internet Cube
60 min

Internet Cube

Let's Build together a Free, Neutral and Decentralized…

Taking a scalpel to QNX
46 min

Taking a scalpel to QNX

Analyzing & Breaking Exploit Mitigations and Secure Random…

Unpatchable
60 min

Unpatchable

Living with a vulnerable implanted device

Lockpicking in the IoT
60 min

Lockpicking in the IoT

...or why adding BTLE to a device sometimes isn't smart at…

SELECT code_execution FROM * USING SQLite;
46 min

SELECT code_execution FROM * USING SQLite;

--Gaining code execution using a malicious SQLite database

The Internet (Doesn&#39;t) Need Another Security Guide
62 min

The Internet (Doesn't) Need Another Security Guide

Creating Internet Privacy and Security Resources That Don't…

Crypto Wars Part II
60 min

Crypto Wars Part II

The Empires Strike Back

The rise and fall of Internet voting in Norway
60 min

The rise and fall of Internet voting in Norway

Evaluating a complex cryptographic implementation

Wallet Security
35 min

Wallet Security

How (not) to protect private keys

Demystifying Network Cards
31 min

Demystifying Network Cards

Things you always wanted to know about NIC drivers