
58 min
Virtual Machine Introspection
From the Outside Looking In

61 min
Now I sprinkle thee with crypto dust
Internet reengineering session

51 min
Funky File Formats
Advanced binary tricks

29 min
Heartache and Heartbleed: The insider’s perspective on the aftermath of Heartbleed
The untold story of what really happened, how it was…

50 min
The Matter of Heartbleed
What went wrong, how the Internet reacted, what we can…

60 min
Vor Windows 8 wird gewarnt
Und nichts (Secure) Bootet mehr?

32 min
Finding the Weak Crypto Needle in a Byte Haystack
Automatic detection of key-reuse vulnerabilities

55 min
Cyber Necromancy
Reverse Engineering Dead Protocols

61 min
Uncaging Microchips
Techniques for Chip Preparation

58 min
Switches Get Stitches
Industrial System Ownership

61 min
Rocket Kitten: Advanced Off-the-Shelf Targeted Attacks Against Nation States
A Deep Technical Analysis

54 min
AMD x86 SMU firmware analysis
Do you care about Matroshka processors?

60 min
Ich sehe, also bin ich ... Du
Gefahren von Kameras für (biometrische)…

61 min
Code Pointer Integrity
... or how we battle the daemons of memory safety

58 min
Glitching For n00bs
A Journey to Coax Out Chips' Inner Secrets

60 min
SS7: Locate. Track. Manipulate.
You have a tracking device in your pocket

55 min
Revisiting SSL/TLS Implementations
New Bleichenbacher Side Channels and Attacks

60 min
osmo-gmr: What's up with sat-phones ?
Piecing together the missing bits

63 min