54 min
Vier Fäuste für ein Halleluja
Geschichten aus dem API-und Protokollkrieg von zwei…
56 min
Blackbox JTAG Reverse Engineering
Discovering what the hardware architects try to hide from…
57 min
SCCP hacking, attacking the SS7 & SIGTRAN applications one step further and mapping the…
Back to the good old Blue Box?
71 min
Defending the Poor
Preventing Flash Exploits
32 min
"Haste ma'n netblock?"
Layer 8 based IP Address hijacking in the end of the days…
51 min
Advanced microcontroller programming
Getting deeper into AVR programming
70 min
coreboot: Adding support for a system near you
Working with the open source BIOS replacement and getting a…
55 min
Building a Debugger
Open JTAG with Voltage Glitching
37 min
Reverse-Engineering DisplayLink devices
USB to DVI for Hackers
128 min
A part time scientists' perspective of getting to the moon
presenting the first German Team participating in the…
47 min
Playing with the GSM RF Interface
Doing tricks with a mobile phone
61 min
DECT (part II)
What has changed in DECT security after one year
52 min
How you can build an eavesdropper for a quantum cryptosystem
hardware demo during the lecture
50 min
Finding the key in the haystack
A practical guide to Differential Power Analysis
40 min