Events for tag "Security & Hacking"

AMD x86 SMU firmware analysis
54 min

AMD x86 SMU firmware analysis

Do you care about Matroshka processors?

Code Pointer Integrity
61 min

Code Pointer Integrity

... or how we battle the daemons of memory safety

SS7: Locate. Track. Manipulate.
60 min

SS7: Locate. Track. Manipulate.

You have a tracking device in your pocket

Switches Get Stitches
58 min

Switches Get Stitches

Industrial System Ownership

ECCHacks
55 min

ECCHacks

A gentle introduction to elliptic-curve cryptography

Funky File Formats
51 min

Funky File Formats

Advanced binary tricks

Glitching For n00bs
58 min

Glitching For n00bs

A Journey to Coax Out Chips' Inner Secrets

Let's Encrypt
42 min

Let's Encrypt

A Certificate Authority To Encrypt the Entire Web

How to Destroy a Laptop with Top Secrets
58 min

How to Destroy a Laptop with Top Secrets

How did GCHQ do it to the Guardian's copy of Snowden's…

osmo-gmr: What's up with sat-phones ?
60 min

osmo-gmr: What's up with sat-phones ?

Piecing together the missing bits

Uncaging Microchips
61 min

Uncaging Microchips

Techniques for Chip Preparation

Ich sehe, also bin ich ... Du
60 min

Ich sehe, also bin ich ... Du

Gefahren von Kameras für (biometrische)…

Jumping the Paywall
29 min

Jumping the Paywall

How to freely share research without being arrested

Reproducible Builds
63 min

Reproducible Builds

Moving Beyond Single Points of Failure for Software…

Helping the Helpless
56 min

Helping the Helpless

Targeted threats to civil society

Finding the Weak Crypto Needle in a Byte Haystack
32 min

Finding the Weak Crypto Needle in a Byte Haystack

Automatic detection of key-reuse vulnerabilities

Cyber Necromancy
55 min

Cyber Necromancy

Reverse Engineering Dead Protocols

Vor Windows 8 wird gewarnt
60 min

Vor Windows 8 wird gewarnt

Und nichts (Secure) Bootet mehr?

How to make your software build reproducibly
55 min

How to make your software build reproducibly

Get a verifiable path from source to binary

Revisiting SSL/TLS Implementations
55 min

Revisiting SSL/TLS Implementations

New Bleichenbacher Side Channels and Attacks

TLS interception considered harmful
52 min

TLS interception considered harmful

How Man-in-the-Middle filtering solutions harm the security…

The Matter of Heartbleed
50 min

The Matter of Heartbleed

What went wrong, how the Internet reacted, what we can…