Solutions for monitoring and lawful interception within a…
implants, sensory extension and silicon - all for you!
What you didn't know about Acrobat
Mitigating cold-boot attacks for Full-Disk-Encryption…
Applications of theorem proving for securing the windows…
Vulnerabilities in the EMV Protocol
Source routing attacks applied to SIP
Introducing Project OsmocomBB
Corporations enabling citizens to print digital money
Why we will have more secure computers - tomorrow
3510 transistors in 60 minutes
Backdooring Embedded Controllers
Attack Vectors Through the Eyes of Software-based Fault…
Nasty effects with tracker-less BitTorrent
Improved approaches for auditive steganography
How we obtained the equivalent power of a Deep Crack for a…
One year of Rocket Science!
all your baseband are belong to us
expanding the attack surface and then some
From analyzing to attacking mobile phones on a large scale.
On Using Anonymizers and Still Get Fucked
SAP Security and the Enterprise
Besitz und Wissen: Relay-Angriffe auf den neuen…
a dump of simple tools for embedded analysis at many layers