3510 transistors in 60 minutes
What you didn't know about Acrobat
Besitz und Wissen: Relay-Angriffe auf den neuen…
implants, sensory extension and silicon - all for you!
a dump of simple tools for embedded analysis at many layers
Introducing Project OsmocomBB
Corporations enabling citizens to print digital money
From analyzing to attacking mobile phones on a large scale.
all your baseband are belong to us
Vulnerabilities in the EMV Protocol
Why we will have more secure computers - tomorrow
Backdooring Embedded Controllers
How we obtained the equivalent power of a Deep Crack for a…
expanding the attack surface and then some
One year of Rocket Science!
On Using Anonymizers and Still Get Fucked
SAP Security and the Enterprise
Nasty effects with tracker-less BitTorrent
Solutions for monitoring and lawful interception within a…
Attack Vectors Through the Eyes of Software-based Fault…
Source routing attacks applied to SIP
Mitigating cold-boot attacks for Full-Disk-Encryption…
Improved approaches for auditive steganography
Applications of theorem proving for securing the windows…