Search for "overflo"

SELECT code_execution FROM * USING SQLite;
46 min

SELECT code_execution FROM * USING SQLite;

--Gaining code execution using a malicious SQLite database

What The Fax?!
46 min

What The Fax?!

Hacking your network likes it's 1980 again

Viva la Vita Vida
56 min

Viva la Vita Vida

Hacking the most secure handheld console

Apple's iPhone 15: Under the C
36 min

Apple's iPhone 15: Under the C

Hardware hacking tooling for the new iPhone generation

Open Source Firmware
49 min

Open Source Firmware

Eine Liebesgeschichte

TrustZone is not enough
31 min

TrustZone is not enough

Hijacking debug components for embedded security

The Mars Rover On-board Computer
43 min

The Mars Rover On-board Computer

How Curiosity's Onboard Computer works, and what you can…

eMMC hacking, or: how I fixed long-dead Galaxy S3 phones
56 min

eMMC hacking, or: how I fixed long-dead Galaxy S3 phones

A journey on how to fix broken proprietary hardware by…

Breaking "DRM" in Polish trains
61 min

Breaking "DRM" in Polish trains

Reverse engineering a train to analyze a suspicious…

Practical Mix Network Design
46 min

Practical Mix Network Design

Strong metadata protection for asynchronous messaging

In Search of Evidence-Based IT-Security
30 min

In Search of Evidence-Based IT-Security

IT security is largely a science-free field. This needs to…

We should share our secrets
59 min

We should share our secrets

Shamir secret sharing: How it works and how to implement it