Search for "OCs of 35C3"

For Fox’s Sake
16 min

For Fox’s Sake

Bypassing Enterprise Policy in Firefox

SCADA - Gateway to (s)hell
45 min

SCADA - Gateway to (s)hell

Hacking industrial control gateways

Wheel of Fortune
36 min

Wheel of Fortune

Analyzing Embedded OS Random Number Generators

To Protect And Infect, Part 2
62 min

To Protect And Infect, Part 2

The militarization of the Internet

Operation Triangulation
58 min

Operation Triangulation

What You Get When Attack iPhones of Researchers

Numerical Air Quality Modeling Systems
61 min

Numerical Air Quality Modeling Systems

a journey from emissions to exposure

Writing secure software
46 min

Writing secure software

using my blog as example

Cat & Mouse: Evading the Censors in 2018
55 min

Cat & Mouse: Evading the Censors in 2018

Preserving access to the open Internet with circumvention…

Virtual Secure Boot
51 min

Virtual Secure Boot

Secure Boot support in qemu, kvm and ovmf.

CAESAR and NORX
61 min

CAESAR and NORX

Developing the Future of Authenticated Encryption