54 min
Do you care about Matroshka processors?
61 min
... or how we battle the daemons of memory safety
55 min
Reverse Engineering Dead Protocols
55 min
A gentle introduction to elliptic-curve cryptography
32 min
Automatic detection of key-reuse vulnerabilities
58 min
A Journey to Coax Out Chips' Inner Secrets
29 min
The untold story of what really happened, how it was…
60 min
Gefahren von Kameras für (biometrische)…
61 min
Internet reengineering session
60 min
Piecing together the missing bits
63 min
Moving Beyond Single Points of Failure for Software…
55 min
New Bleichenbacher Side Channels and Attacks
61 min
A Deep Technical Analysis
60 min
You have a tracking device in your pocket
58 min
Industrial System Ownership
50 min
What went wrong, how the Internet reacted, what we can…
61 min
Techniques for Chip Preparation
58 min
From the Outside Looking In
60 min
Und nichts (Secure) Bootet mehr?