Events for tag "Hacking"

"Haste ma'n netblock?"
32 min

"Haste ma'n netblock?"

Layer 8 based IP Address hijacking in the end of the days…

CR217 - Professional Hackers
119 min

CR217 - Professional Hackers

Ein Einblick in die Security-Industrie

Implementation of MITM Attack on HDCP-Secured Links
45 min

Implementation of MITM Attack on HDCP-Secured Links

A non-copyright circumventing application of the HDCP…

3G Investigations
52 min

3G Investigations

Scanning your GPRS/UMTS IP network for fun and profit

Hopalong Casualty
45 min

Hopalong Casualty

On automated video analysis of human behaviour

I See Airplanes!
51 min

I See Airplanes!

How to build your own radar system

Programming FPGAs with PSHDL
48 min

Programming FPGAs with PSHDL

Lets create the Arduino for FPGAs

OpenPCD / OpenPICC
79 min

OpenPCD / OpenPICC

Free RFID reader and emulator

Hacking CCTV
56 min

Hacking CCTV

Watching the watchers, having fun with cctv cameras, making…

The A5 Cracking Project
61 min

The A5 Cracking Project

Practical attacks on GSM using GNU Radio and FPGAs

Tracker fahrn
75 min

Tracker fahrn

We Track Harder - We Track More! Take the pain out of…

Building a Debugger
55 min

Building a Debugger

Open JTAG with Voltage Glitching

media.ccc.de
39 min

media.ccc.de

Das YouTube des CCC

PyPy - the new Python implementation on the block
61 min

PyPy - the new Python implementation on the block

Language/VM R&D, whole program type inference, translation…

Time is on my Side
61 min

Time is on my Side

Exploiting Timing Side Channel Vulnerabilities on the Web

A 10GE monitoring system
52 min

A 10GE monitoring system

Hacking a 10 Gigabit Intrusion detection and prevention…

Strong encryption of credit card information
51 min

Strong encryption of credit card information

Attacks on common failures when encrypting credit card…

Don't scan, just ask
26 min

Don't scan, just ask

A new approach of identifying vulnerable web applications

Towards the first Free Software GSM Phone
56 min

Towards the first Free Software GSM Phone

Reverse Engineering the Motorola EZX (A768,A780,E680)…

EFI Rootkits
51 min

EFI Rootkits

Abusing your Firmware to backdoor the kernel

Tor and China
87 min

Tor and China

Design of a blocking-resistant anonymity system

802.11 Packets in Packets
57 min

802.11 Packets in Packets

A Standard-Compliant Exploit of Layer 1

XMPP/Jabber
34 min

XMPP/Jabber

Introducing the 'lingua franca' of Instant Messaging

Java wird Groovy
50 min

Java wird Groovy

Eine Einführung in die neue, dynamische Sprache für das…

What you thought you knew about C
47 min

What you thought you knew about C

Impacts of undefined behaviour and other C oddities

Passive covert channels in the Linux kernel
115 min

Passive covert channels in the Linux kernel

Implementation and detection of kernel based backdoors and…

Hacking SCADA
57 min

Hacking SCADA

how to own critical infrastructures

Exploiting Symbian
63 min

Exploiting Symbian

Symbian Exploit and Shellcode Development

Finding the key in the haystack
50 min

Finding the key in the haystack

A practical guide to Differential Power Analysis

10GE monitoring live!
59 min

10GE monitoring live!

How to find that special one out of millions

Router and Infrastructure Hacking
45 min

Router and Infrastructure Hacking

"First we take Manhattan, then we take Berlin..."

The DRM Of Pacman
31 min

The DRM Of Pacman

Copy protection schemes of way back then and how they…

C64-DTV Hacking
57 min

C64-DTV Hacking

Revisiting the legendary computer in a joystick

VoIPhreaking
49 min

VoIPhreaking

Introduction to SIP Hacking

Stealth malware - can good guys win?
78 min

Stealth malware - can good guys win?

Challenges in detecting system compromises and why we’re so…

COMPLETE Hard Disk Encryption with FreeBSD
66 min

COMPLETE Hard Disk Encryption with FreeBSD

Learn how to effectively protect not only your data but…

"Xbox" and "Xbox 360" Hacking
113 min

"Xbox" and "Xbox 360" Hacking

17 Mistakes Microsoft Made in the Xbox Security System &…

Inside the Mac OS X Kernel
42 min

Inside the Mac OS X Kernel

Debunking Mac OS Myths

Vertex Hacking
48 min

Vertex Hacking

Reverse Engineering von 3D-Dateiformaten

hpfriends: real-time social data-sharing
48 min

hpfriends: real-time social data-sharing

publish-subscribe feeds + trust relationship network

Datenvieh oder Daten-Fee
67 min

Datenvieh oder Daten-Fee

Welchen Wert haben Trackingdaten?

Analog Computing
39 min

Analog Computing

High performance/low power computing based on the analog…

Deceiving Authorship Detection
59 min

Deceiving Authorship Detection

Tools to Maintain Anonymity Through Writing Style & Current…

Unlocking FileVault
54 min

Unlocking FileVault

An analysis of Apple's encrypted disk storage system

Rootkits in your Web application
56 min

Rootkits in your Web application

Achieving a permanent stealthy compromise of user accounts…

Sovereign Keys
64 min

Sovereign Keys

A proposal for fixing attacks on CAs and DNSSEC

Defending the Poor
71 min

Defending the Poor

Preventing Flash Exploits

Your Disaster/Crisis/Revolution just got Pwned
45 min

Your Disaster/Crisis/Revolution just got Pwned

Telecomix and Geeks without Bounds on Security and Crisis…

Vier Fäuste für ein Halleluja
54 min

Vier Fäuste für ein Halleluja

Geschichten aus dem API-und Protokollkrieg von zwei…

Embedded device security nightmares
46 min

Embedded device security nightmares

An Introduction to the usual mistakes

Console Hacking 2008: Wii Fail
56 min

Console Hacking 2008: Wii Fail

Is implementation the enemy of design?

SMS-o-Death
61 min

SMS-o-Death

From analyzing to attacking mobile phones on a large scale.

Men who stare at bits
44 min

Men who stare at bits

Die abenteuerliche Analyse des Datenformats eines real…

Having fun with RTP
36 min

Having fun with RTP

„Who is speaking???“

Einführung in Django
41 min

Einführung in Django

"The Web Framework for perfectionists with deadlines."

I Control Your Code
62 min

I Control Your Code

Attack Vectors Through the Eyes of Software-based Fault…

Tricks: makes you smile
35 min

Tricks: makes you smile

A clever or ingenious device or expedient; adroit…

How To Design A Decent User Interface
57 min

How To Design A Decent User Interface

Take a look at software from a user's point of view and…

DECT
66 min

DECT

The Digital Enhanced Cordless Telecommunications standard

SIP home gateways under fire
25 min

SIP home gateways under fire

Source routing attacks applied to SIP

Security Nightmares 2008
90 min

Security Nightmares 2008

Oder: worüber wir nächstes Jahr lachen werden

I/O Capture Treiber Framework
83 min

I/O Capture Treiber Framework

Maßgeschneiderte Geräte-Filtertreiber auf Knopfdruck

Let's tear down these walls
46 min

Let's tear down these walls

"Mit Links" die Mauern Sozialer Netzwerke überwinden.

SDR, GSM/OpenBTS
52 min

SDR, GSM/OpenBTS

New RF technology - exciting for good guys, bad guys,…

To be or I2P
50 min

To be or I2P

An introduction into anonymous communication with I2P

Signal Intelligence und Electronic Warfare
46 min

Signal Intelligence und Electronic Warfare

Wie man nach Hause telefoniert, ohne von einer Rakete…

One Token to Rule Them All
48 min

One Token to Rule Them All

Post-Exploitation Fun in Windows Environments

Secure Code
57 min

Secure Code

Why developing Secure Software is like playing Marble…

FAIFA: A first open source PLC tool
50 min

FAIFA: A first open source PLC tool

PowerLineCommunications has now their open source tool

secuBT
57 min

secuBT

Hacking the Hackers with User-Space Virtualization

Secure Network Server Programming on Unix
45 min

Secure Network Server Programming on Unix

Techniques and best practices to securely code your network…

Clickjacking und UI-Redressing
53 min

Clickjacking und UI-Redressing

Wie Hacker vorgehen und wie man sich schützen kann

Making music with a C compiler
53 min

Making music with a C compiler

(also introducing libglitch)

How to (really) forget your secret crypto key
34 min

How to (really) forget your secret crypto key

What you always wanted to know about Flash memory - but…

CSRF, the Intranet and You
61 min

CSRF, the Intranet and You

Causes, Attacks and Countermeasures

Automated Botnet Detection and Mitigation
53 min

Automated Botnet Detection and Mitigation

How to find, invade and kill botnets automated and…

Ooops I hacked my PBX
28 min

Ooops I hacked my PBX

Why auditing proprietary protocols matters

The blackbox in your phone
58 min

The blackbox in your phone

Some details about SIM cards

Private investigations in searching
53 min

Private investigations in searching

How to find any book (and many other roadkills) on the…

"Die gesamte Technik ist sicher"
60 min

"Die gesamte Technik ist sicher"

Besitz und Wissen: Relay-Angriffe auf den neuen…

Sicherheitsanalyse von IT-Großprojekten der öffentlichen Hand
64 min

Sicherheitsanalyse von IT-Großprojekten der öffentlichen Hand

Untersuchung eines Austauschsystems für hochsensible…

OMG WTF PDF
57 min

OMG WTF PDF

What you didn't know about Acrobat

WarTracking
53 min

WarTracking

Satellite Tracking, harvesting and security

Attacking NFC mobile phones
82 min

Attacking NFC mobile phones

First look at the security of NFC mobile phones

Blackbox JTAG Reverse Engineering
56 min

Blackbox JTAG Reverse Engineering

Discovering what the hardware architects try to hide from…

Wireless Kernel Tweaking
63 min

Wireless Kernel Tweaking

or how B.A.T.M.A.N. learned to fly

Print Me If You Dare
63 min

Print Me If You Dare

Firmware Modification Attacks and the Rise of Printer…

Mehr Sicherheit für HostAP-WLANs
29 min

Mehr Sicherheit für HostAP-WLANs

WLANs mit Wi-Fi Protected Access (WPA) betreiben

The engineering part of social engineering
52 min

The engineering part of social engineering

Why just lying your way in won't get you anywhere

Hacking the iPhone
58 min

Hacking the iPhone

Pwning Apple's Mobile Internet Device

Cuckoo Sandbox - malware beware
55 min

Cuckoo Sandbox - malware beware

Open Source Dynamic Malware Analysis

Playstation Portable Cracking
34 min

Playstation Portable Cracking

How In The End We Got It All!

Inside Sputnik & OpenBeacon - Smart Dust for the Masses
46 min

Inside Sputnik & OpenBeacon - Smart Dust for the Masses

a hackers guide into homebrewn 2.4GHz hardware & peripherals

Macro dragnets: Why trawl the river when you can do the whole ocean
60 min

Macro dragnets: Why trawl the river when you can do the whole ocean

What happens when data collection goes awry in the 21st…

Understanding buffer overflow exploitation
59 min

Understanding buffer overflow exploitation

The fascinating interplay of CPU, stack, C-compiler and…

A not so smart card
47 min

A not so smart card

How bad security decisions can ruin a debit card design

Benutze Krake mit Gerät
60 min

Benutze Krake mit Gerät

Programmierbare Logik für Deinen Hardware…

Know your compiler
53 min

Know your compiler

...and what the optimizer does so you don't have to

TCP Denial of Service Vulnerabilities
30 min

TCP Denial of Service Vulnerabilities

Accepting the Partial Disclosure Challenge

Anonymous Data Broadcasting by Misuse of Satellite ISPs
43 min

Anonymous Data Broadcasting by Misuse of Satellite ISPs

An open-source project to develop a tool for broadband…

Distributed FPGA Number Crunching For The Masses
56 min

Distributed FPGA Number Crunching For The Masses

How we obtained the equivalent power of a Deep Crack for a…

The Cell Processor
64 min

The Cell Processor

Computing of Tomorrow or Yesterday

Physical Security
58 min

Physical Security

The Good, the Bad and the Ugly

Blinkenlights Stereoscope
65 min

Blinkenlights Stereoscope

Behind the scenes of the new light installation

How to implement bignum arithmetic
47 min

How to implement bignum arithmetic

A short look at my pet project implementation

Practical Mac OS X Insecurity
52 min

Practical Mac OS X Insecurity

Security Concepts, Problems, and Exploits on Your Mac

Hacking into TomTom Go
52 min

Hacking into TomTom Go

Reverse-Engineering des Embedded-Linux-Navigationssystems

A Case Against C++
53 min

A Case Against C++

Why C++ is bad for the environment, causes global warming…

The Ultimate Commodore 64 Talk
61 min

The Ultimate Commodore 64 Talk

Everything about the C64 in 64 Minutes

Lawful Interception in VoIP networks
49 min

Lawful Interception in VoIP networks

Old Laws and New Technology the German Way

Autodafé: An Act of Software Torture
38 min

Autodafé: An Act of Software Torture

Presentation of an innovative buffer overflow uncovering…

Power gadgets with your own electricity
63 min

Power gadgets with your own electricity

escape the basement and make the sun work for you

coreboot: Adding support for a system near you
70 min

coreboot: Adding support for a system near you

Working with the open source BIOS replacement and getting a…

Crouching Powerpoint, Hidden Trojan
53 min

Crouching Powerpoint, Hidden Trojan

An analysis of targeted attacks from 2005 to 2007

Detecting temperature through clock skew
62 min

Detecting temperature through clock skew

Hot or Not: Defeating anonymity by monitoring clock skew to…

Building an Open Source PKI using OpenXPKI
54 min

Building an Open Source PKI using OpenXPKI

Take a lot of Perl, add some OpenSSL, sprinkle it with a…

JTAG/Serial/FLASH/PCB Embedded Reverse Engineering Tools and Techniques
56 min

JTAG/Serial/FLASH/PCB Embedded Reverse Engineering Tools and Techniques

a dump of simple tools for embedded analysis at many layers

Data Mining the Israeli Census
26 min

Data Mining the Israeli Census

Insights into a publicly available registry

SWF and the Malware Tragedy
48 min

SWF and the Malware Tragedy

Hide and Seek in A. Flash

Lying To The Neighbours
34 min

Lying To The Neighbours

Nasty effects with tracker-less BitTorrent

Peer-to-peer under the hood
47 min

Peer-to-peer under the hood

An in-depth look at p2p algorithmics

A collection of random things
46 min

A collection of random things

Look what I found under the carpet

Virtuelle Sicherheit
63 min

Virtuelle Sicherheit

Mandatory Access Control und TPM in Xen

Introducing Osmo-GMR
55 min

Introducing Osmo-GMR

Building a sniffer for the GMR satphones

DECT (part II)
61 min

DECT (part II)

What has changed in DECT security after one year

Ethernet mit Mikrocontrollern
49 min

Ethernet mit Mikrocontrollern

Wie funktioniert TCP mit 2kb RAM?

Writing better code (in Dylan)
59 min

Writing better code (in Dylan)

Fast development of object-oriented functional programs

SPAM Workshop
110 min

SPAM Workshop

SPAM- und Zombie-Abwehr bei hohem Mail-Volumen am Beispiel…

Hacking MFPs
57 min

Hacking MFPs

Part2 - PostScript: Um, you've been hacked

Twisting timing in your favour
43 min

Twisting timing in your favour

Finding and exploiting concurrency issues in software

The Kernel Accelerator Device
45 min

The Kernel Accelerator Device

Reconfigurable computing for the kernel

muXTCP
50 min

muXTCP

Writing your own flexible Userland TCP/IP Stack - Ninja…

Chip and PIN is Broken
57 min

Chip and PIN is Broken

Vulnerabilities in the EMV Protocol

The Baseband Apocalypse
66 min

The Baseband Apocalypse

all your baseband are belong to us

Android Security
57 min

Android Security

bringing x86 fuckups to dalvik

coreboot: Beyond The Final Frontier
50 min

coreboot: Beyond The Final Frontier

Open source BIOS replacement with a radical approach to…

Inside VMware
68 min

Inside VMware

How VMware, VirtualPC and Parallels actually work

Finding and Preventing Buffer Overflows
45 min

Finding and Preventing Buffer Overflows

An overview of static and dynamic approaches

Mifare
59 min

Mifare

Little Security, Despite Obscurity

Introduction to SecureShare
20 min

Introduction to SecureShare

A peer-to-peer, end-to-end encrypted social networking…

Secure Instant Messaging
46 min

Secure Instant Messaging

Suppression of secure communications by governments

Android Analysis Framework
55 min

Android Analysis Framework

dex reversing in deep

OnionCat – A Tor-based Anonymous VPN
44 min

OnionCat – A Tor-based Anonymous VPN

Building an anonymous Internet within the Internet

Honeypot Forensics
117 min

Honeypot Forensics

No stone unturned or: logs, what logs?

Advanced memory forensics: The Cold Boot Attacks
58 min

Advanced memory forensics: The Cold Boot Attacks

Recovering keys and other secrets after power off

Handschellen hacken
61 min

Handschellen hacken

Essentielles Grundwissen für alle, die nichts zu verbergen…

I know who you clicked last summer
52 min

I know who you clicked last summer

A swiss army knife for automatic social investigation

Project Sputnik
135 min

Project Sputnik

Realtime in-building location tracking at the 23C3

Contemporary Profiling of Web Users
54 min

Contemporary Profiling of Web Users

On Using Anonymizers and Still Get Fucked

FrozenCache
55 min

FrozenCache

Mitigating cold-boot attacks for Full-Disk-Encryption…

The Future of Virtualization
55 min

The Future of Virtualization

The "anyOS" paradigm and its implications through…

Honeymonkeys
46 min

Honeymonkeys

Chasing hackers with a bunch of monkeys

WiFi Long Shots
52 min

WiFi Long Shots

Wireless connections of 20km and more

NOC Review
34 min

NOC Review

NOC Review about the Camp 2011 and the 28C3

From Ring Zero to UID Zero
42 min

From Ring Zero to UID Zero

A couple of stories about kernel exploiting

Data Analysis in Terabit Ethernet Traffic
50 min

Data Analysis in Terabit Ethernet Traffic

Solutions for monitoring and lawful interception within a…

Security Nightmares 2009
94 min

Security Nightmares 2009

Oder: worüber wir nächstes Jahr lachen werden

The Realtime Podcast
61 min

The Realtime Podcast

Everything you need to know about Podcasting

String Oriented Programming
47 min

String Oriented Programming

Circumventing ASLR, DEP, and Other Guards

Jabber-Showcase
34 min

Jabber-Showcase

XMPP ist viel mehr als nur Instant Messaging

Subverting AJAX
53 min

Subverting AJAX

Next generation vulnerabilities in 2.0 Web Applications

Fuzzing
107 min

Fuzzing

Breaking software in an automated fashion

Post Memory Corruption Memory Analysis
62 min

Post Memory Corruption Memory Analysis

Automating exploitation of invalid memory writes

iOS application security
51 min

iOS application security

A look at the security of 3rd party iOS applications

ChokePointProject - Quis custodiet ipsos custodes?
26 min

ChokePointProject - Quis custodiet ipsos custodes?

Aggregating and Visualizing (lack of) Transparancy Data in…

The Realtime thing
44 min

The Realtime thing

What the heck is realtime - and what to do with it

DC+, The Protocol
41 min

DC+, The Protocol

Technical defense against data retention law

Practical RFID Attacks
65 min

Practical RFID Attacks

writing, sniffing & emulating 13.56MHz RFID tags with…

Introduction to matrix programming: trance codes
45 min

Introduction to matrix programming: trance codes

How to recognize trance coded communication patterns

Community mesh networking
54 min

Community mesh networking

Ubiquitous wireless mesh clouds with olsrd from olsr.org

Black Ops Of TCP/IP 2005.5
60 min

Black Ops Of TCP/IP 2005.5

New Explorations: Large Graphs, Larger Threats

Anatomy of smartphone hardware
56 min

Anatomy of smartphone hardware

Dissecting contemporary cellphone hardware

Drohnen züchten
36 min

Drohnen züchten

UAVs und andere spannende Dinge

Black Ops 2006 Viz Edition
55 min

Black Ops 2006 Viz Edition

Pixel Fuzzing and the Bioinformatic Bindiff

Machine-to-machine (M2M) security
45 min

Machine-to-machine (M2M) security

When physical security depends on IT security

Messing Around with Garage Doors
76 min

Messing Around with Garage Doors

Breaking Remote Keyless Entry Systems with Power Analysis

An Introduction to Traffic Analysis
60 min

An Introduction to Traffic Analysis

Attacks, Defences and Public Policy Issues...

Faster PwninG Assured
60 min

Faster PwninG Assured

Hardware Hacks and Cracks with FPGAs

Syscall proxying fun and applications
49 min

Syscall proxying fun and applications

Introduction to syscall proxying and applications for in…

Der Staatstrojaner
128 min

Der Staatstrojaner

Vom braunen Briefumschlag bis zur Publikation

Old Skewl Hacking - InfraRed updated
49 min

Old Skewl Hacking - InfraRed updated

MMIrDA - Major Malfunction's InfraRed Discovery Application

Security in the cardholder data processing?!
71 min

Security in the cardholder data processing?!

Experiences and lessons learned with the Payment Card…

Desperate House-Hackers
56 min

Desperate House-Hackers

How to Hack the Pfandsystem

Squeezing Attack Traces
38 min

Squeezing Attack Traces

How to get useable information out of your honeypot

GPS-Trackers
48 min

GPS-Trackers

How they track you when your mobile is switched off

Zero-sized heap allocations vulnerability analysis
65 min

Zero-sized heap allocations vulnerability analysis

Applications of theorem proving for securing the windows…

Freedom from the web's monopolies
32 min

Freedom from the web's monopolies

A better architecture for the web, beneficial to both…

Unusual Web Bugs
44 min

Unusual Web Bugs

A Web Hacker's Bag O' Tricks

Void the warranty!
52 min

Void the warranty!

How to start analyzing blackboxes

Defense is not dead
64 min

Defense is not dead

Why we will have more secure computers - tomorrow

hacking smart phones
73 min

hacking smart phones

expanding the attack surface and then some

Bluetooth Hacking - The State of The Art
93 min

Bluetooth Hacking - The State of The Art

A roundup and live demonstrations of all currently known…

The Hidden Nemesis
47 min

The Hidden Nemesis

Backdooring Embedded Controllers

Advanced microcontroller programming
51 min

Advanced microcontroller programming

Getting deeper into AVR programming

Software Reliability in Aerospace
57 min

Software Reliability in Aerospace

An overview on design and generation of safe and reliable…

Cybernetics for the Masses
39 min

Cybernetics for the Masses

implants, sensory extension and silicon - all for you!

How to find *anything* on the Web
85 min

How to find *anything* on the Web

Advanced internet searching strategies & "wizard seeking"…

Security Nightmares 2007
72 min

Security Nightmares 2007

Oder: worüber wir nächstes Jahr lachen werden

Console Hacking 2006
50 min

Console Hacking 2006

Xbox 360, Playstation 3, Wii

Atmel AVR für Dummies
46 min

Atmel AVR für Dummies

Was ist denn nun eigentlich so ein 'Interrupt'?

Security Nightmares 2006
64 min

Security Nightmares 2006

Oder: worüber wir nächstes Jahr lachen werden

Military intelligence for terrorists(tm)
52 min

Military intelligence for terrorists(tm)

A lamer's introduction to retrieving "sensitive"…

Hacking Data Retention
49 min

Hacking Data Retention

How bureaucrats fail to fight terror

Transcending Places
48 min

Transcending Places

Programming With Values

Fudging with Firmware
43 min

Fudging with Firmware

Firmware reverse-engineering tactics

Banking Malware 101
63 min

Banking Malware 101

Overview of Current Keylogger Threats

Covert channels in TCP/IP: attack and defence
42 min

Covert channels in TCP/IP: attack and defence

Creation and detection of IP steganography for covert…

Antiforensik
32 min

Antiforensik

Einführung in das Thema Antiforensik am Beispiel eines…

Blackberry: call to arms, some provided
53 min

Blackberry: call to arms, some provided

Teach yourself upper management in 22 days

Dynamic Malware Analysis on Android Phones
44 min

Dynamic Malware Analysis on Android Phones

Presentation of the DyAnA Framework (Dynamic Android…

Reverse Engineering a real-world RFID payment system
58 min

Reverse Engineering a real-world RFID payment system

Corporations enabling citizens to print digital money

Mobile phone call encryption
69 min

Mobile phone call encryption

Encrypting (GSM) mobile phone calls over VPN with an…

Collateral Damage
54 min

Collateral Damage

Consequences of Spam and Virus Filtering for the E-Mail…

TV-B-Gone
61 min

TV-B-Gone

Better Living Through Inventing

Bionic Ears
62 min

Bionic Ears

Introduction into State-of-the-Art Hearing Aid Technology

Can trains be hacked?
64 min

Can trains be hacked?

Die Technik der Eisenbahnsicherungsanlagen

Automated Exploit Detection in Binaries
46 min

Automated Exploit Detection in Binaries

Finding exploitable vulnerabilities in binaries

Playing with the GSM RF Interface
47 min

Playing with the GSM RF Interface

Doing tricks with a mobile phone

Cryptographic key recovery from Linux memory dumps
65 min

Cryptographic key recovery from Linux memory dumps

Does dm-crypt and cryptoloop provide expected security when…