Search for "Twi"

SELECT code_execution FROM * USING SQLite;
46 min

SELECT code_execution FROM * USING SQLite;

--Gaining code execution using a malicious SQLite database

Quantum Cryptography
60 min

Quantum Cryptography

from key distribution to position-based cryptography

Operation Triangulation
58 min

Operation Triangulation

What You Get When Attack iPhones of Researchers

Drones
60 min

Drones

Autonomous flying vehicles, where are we and where are we…

An introduction to Firmware Analysis
40 min

An introduction to Firmware Analysis

Techniques - Tools - Tricks

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

Hunting the Sigfox: Wireless IoT Network Security
38 min

Hunting the Sigfox: Wireless IoT Network Security

Dissecting the radio protocol of Sigfox, the global…

Basics of Digital Wireless Communication
46 min

Basics of Digital Wireless Communication

introduction to software radio principles

Building and Breaking Wireless Security
29 min

Building and Breaking Wireless Security

Wireless Physical Layer Security & More...

SCADA - Gateway to (s)hell
45 min

SCADA - Gateway to (s)hell

Hacking industrial control gateways