61 min
Internet reengineering session
58 min
From the Outside Looking In
29 min
The untold story of what really happened, how it was…
50 min
What went wrong, how the Internet reacted, what we can…
60 min
Und nichts (Secure) Bootet mehr?
32 min
Automatic detection of key-reuse vulnerabilities
55 min
Reverse Engineering Dead Protocols
61 min
Techniques for Chip Preparation
58 min
Industrial System Ownership
61 min
A Deep Technical Analysis
55 min
A gentle introduction to elliptic-curve cryptography
54 min
Do you care about Matroshka processors?
60 min
Gefahren von Kameras für (biometrische)…
61 min
... or how we battle the daemons of memory safety
60 min
You have a tracking device in your pocket
58 min
A Journey to Coax Out Chips' Inner Secrets
60 min
Piecing together the missing bits
55 min
New Bleichenbacher Side Channels and Attacks
63 min
Moving Beyond Single Points of Failure for Software…