29 min
The untold story of what really happened, how it was…
32 min
Automatic detection of key-reuse vulnerabilities
50 min
What went wrong, how the Internet reacted, what we can…
54 min
Do you care about Matroshka processors?
55 min
A gentle introduction to elliptic-curve cryptography
55 min
New Bleichenbacher Side Channels and Attacks
55 min
Reverse Engineering Dead Protocols
58 min
Industrial System Ownership
58 min
From the Outside Looking In
58 min
A Journey to Coax Out Chips' Inner Secrets
60 min
Piecing together the missing bits
60 min
Gefahren von Kameras für (biometrische)…
60 min
Und nichts (Secure) Bootet mehr?
60 min
You have a tracking device in your pocket
61 min
... or how we battle the daemons of memory safety
61 min
Internet reengineering session
61 min
A Deep Technical Analysis
61 min
Techniques for Chip Preparation
63 min
Moving Beyond Single Points of Failure for Software…