40 min
Techniques - Tools - Tricks
41 min
Side-Channel (and other) Attacks in Practice
42 min
Embedded Security Using Binary Autotomy
45 min
OMG - my Smart TV got pr0wn3d
45 min
Deep program analysis without the headache
45 min
The militarization of the Internet
47 min
Applying science to eliminate 100% of buffer overflows
47 min
Dynamic Dalvik Instrumentation of Android Applications and…
47 min
Clean boot every boot - rejecting persistence of malicious…
51 min
A Decentralized PKI For Social Movements
55 min
Attribute Based Credentials in Practice
56 min
what is the winning move?
56 min
Stealing Money from ATMs with Malware
57 min
Was tun nach der mittelmäßigen Kryptographie-Apokalypse?
58 min
Physically Unclonable Functions for Hardware Tamper…
58 min
Hacking City-Wide Access Control Systems
59 min
The future of IC analysis
59 min
Ein Streifzug durch die Fehler in der Kryptografie
61 min
Von der Historie zur Zukunft
62 min
The militarization of the Internet