Events for tag "Security"

Ladeinfrastruktur für Elektroautos: Ausbau statt Sicherheit
52 min

Ladeinfrastruktur für Elektroautos: Ausbau statt Sicherheit

Warum das Laden eines Elektroautos unsicher ist

Decoding the LoRa PHY
64 min

Decoding the LoRa PHY

Dissecting a Modern Wireless Network for the Internet of…

How hackers grind an MMORPG: by taking it apart!
54 min

How hackers grind an MMORPG: by taking it apart!

An introduction to reverse engineering network protocols

Console Hacking 2016
53 min

Console Hacking 2016

PS4: PC Master Race

Gone in 60 Milliseconds
33 min

Gone in 60 Milliseconds

Intrusion and Exfiltration in Server-less Architectures

Untrusting the CPU
61 min

Untrusting the CPU

A proposal for secure computing in an age where we cannot…

Build your own NSA
60 min

Build your own NSA

How private companies leak your personal data into the…

Console Security - Switch
56 min

Console Security - Switch

Homebrew on the Horizon

Bitcoin
64 min

Bitcoin

Open Sourcing Money

Are all BSDs created equally?
58 min

Are all BSDs created equally?

A survey of BSD kernel vulnerabilities.

Building and Breaking Wireless Security
29 min

Building and Breaking Wireless Security

Wireless Physical Layer Security & More...

Shopshifting
60 min

Shopshifting

The potential for payment system abuse

How to drift with any car
51 min

How to drift with any car

(without your mom yelling at you)

Exploiting PHP7 unserialize
44 min

Exploiting PHP7 unserialize

teaching a new dog old tricks

Cloud Storage Encryption with Cryptomator
57 min

Cloud Storage Encryption with Cryptomator

Cryptomator is a multi-platform, client-side encryption…

Kerberos und OTP
49 min

Kerberos und OTP

Nur einmal authentisiert - aber stark!

The Perl Jam 2
60 min

The Perl Jam 2

The Camel Strikes Back

Rowhammer.js: Root privileges for web apps?
30 min

Rowhammer.js: Root privileges for web apps?

A tale of fault attacks on DRAM and attacks on CPU caches

SCADA - Gateway to (s)hell
45 min

SCADA - Gateway to (s)hell

Hacking industrial control gateways

Everything you want to know about x86 microcode, but might have been afraid to ask
57 min

Everything you want to know about x86 microcode, but might have been afraid to ask

An introduction into reverse-engineering x86 microcode and…

Shut Up and Take My Money!
30 min

Shut Up and Take My Money!

The Red Pill of N26 Security

Beyond your cable modem
60 min

Beyond your cable modem

How not to do DOCSIS networks

A look into the Mobile Messaging Black Box
63 min

A look into the Mobile Messaging Black Box

A gentle introduction to mobile messaging and subsequent…

CloudABI
62 min

CloudABI

Pure capability-based security for UNIX

Unpatchable
60 min

Unpatchable

Living with a vulnerable implanted device

The DROWN Attack
55 min

The DROWN Attack

Breaking TLS using SSLv2

Talking Behind Your Back
59 min

Talking Behind Your Back

On the Privacy & Security of the Ultrasound Tracking…

Taking a scalpel to QNX
46 min

Taking a scalpel to QNX

Analyzing & Breaking Exploit Mitigations and Secure Random…

Dissecting VoLTE
49 min

Dissecting VoLTE

Exploiting Free Data Channels and Security Problems

eMMC hacking, or: how I fixed long-dead Galaxy S3 phones
56 min

eMMC hacking, or: how I fixed long-dead Galaxy S3 phones

A journey on how to fix broken proprietary hardware by…

Decoding Contactless (Card) Payments
58 min

Decoding Contactless (Card) Payments

An Exploration of NFC Transactions and Explanation How…

DANEn lügen nicht
61 min

DANEn lügen nicht

SSL/TLS Zertifikate mit DNSSEC absichern

We should share our secrets
59 min

We should share our secrets

Shamir secret sharing: How it works and how to implement it

Sichere Softwareentwicklung
54 min

Sichere Softwareentwicklung

Ein praktischer Einstieg

TrustZone is not enough
31 min

TrustZone is not enough

Hijacking debug components for embedded security

Code BROWN in the Air
37 min

Code BROWN in the Air

A systemic update of sensitive information that you sniff…

PLC-Blaster
58 min

PLC-Blaster

Ein Computerwurm für PLCs

What could possibly go wrong with <insert x86 instruction here>?
55 min

What could possibly go wrong with <insert x86 instruction here>?

Side effects include side-channel attacks and bypassing…

The plain simple reality of entropy
60 min

The plain simple reality of entropy

Or how I learned to stop worrying and love urandom

Electromagnetic Threats for Information Security
49 min

Electromagnetic Threats for Information Security

Ways to Chaos in Digital and Analogue Electronics

Turris: secure open source router
52 min

Turris: secure open source router

Who is the root on your router?

Key-logger, Video, Mouse
49 min

Key-logger, Video, Mouse

How to turn your KVM into a raging key-logging monster

ASLR on the line
44 min

ASLR on the line

Practical cache attacks on the MMU

Doping your Fitbit
22 min

Doping your Fitbit

On Fitbit Firmware Modifications and Data Extraction

Wheel of Fortune
36 min

Wheel of Fortune

Analyzing Embedded OS Random Number Generators

De-anonymizing Programmers
59 min

De-anonymizing Programmers

Large Scale Authorship Attribution from Executable Binaries…

Deploying TLS 1.3: the great, the good and the bad
61 min

Deploying TLS 1.3: the great, the good and the bad

Improving the encrypted the web, one round-trip at a time

Beyond Anti Evil Maid
60 min

Beyond Anti Evil Maid

Making it easier to avoid low-level compromise, and why…

Attacking IoT Telemetry
70 min

Attacking IoT Telemetry

A study of weaknesses in the pipeline of rapidly advancing…

Web-App-Encryption
63 min

Web-App-Encryption

Is your data secure by default? How Django can be used to…

Virtual Secure Boot
51 min

Virtual Secure Boot

Secure Boot support in qemu, kvm and ovmf.

LatticeHacks
65 min

LatticeHacks

Fun with lattices in cryptography and cryptanalysis

Intercoms Hacking
40 min

Intercoms Hacking

Call the frontdoor to install your backdoors

CloudABI
57 min

CloudABI

Cloud computing meets fine-grained capabilities

PQCHacks
60 min

PQCHacks

A gentle introduction to post-quantum cryptography

To Make Hearts Bleed
57 min

To Make Hearts Bleed

A Native Developer's Account On SSL

Sanitizing PCAPs
43 min

Sanitizing PCAPs

Fun and games until someone uses IPv6 or TCP

Console Hacking
72 min

Console Hacking

Breaking the 3DS

Alles meins!
59 min

Alles meins!

Zugänge und Daten mit privacyIDEA absichern

DPRK Consumer Technology
31 min

DPRK Consumer Technology

Facts to fight lore

LinOTP und Single Sign On
53 min

LinOTP und Single Sign On

Zwei-Faktor Authentisierung in der Praxis

Visiting The Bear Den
59 min

Visiting The Bear Den

A Journey in the Land of (Cyber-)Espionage

The long road to reproducible builds
41 min

The long road to reproducible builds

why+how to create bit by bit identical binary packages

A Dozen Years of Shellphish
57 min

A Dozen Years of Shellphish

From DEFCON to the DARPA Cyber Grand Challenge

Pegasus internals
29 min

Pegasus internals

Technical Teardown of the Pegasus malware and Trident…

avatar²
55 min

avatar²

Towards an open source binary firmware analysis framework

Check your privileges!
60 min

Check your privileges!

How to drop more of your privileges to reduce attack…

Container for Desktops
61 min

Container for Desktops

Security und Privacy mit LXC et.al. - auch auf…

OpenVPN im Unternehmenseinsatz
37 min

OpenVPN im Unternehmenseinsatz

Realisierung einer Hochverfügbarkeitslösung mit dynamischem…