60 min
You have a tracking device in your pocket
60 min
Gefahren von Kameras für (biometrische)…
60 min
Und nichts (Secure) Bootet mehr?
55 min
A gentle introduction to elliptic-curve cryptography
61 min
Techniques for Chip Preparation
55 min
Reverse Engineering Dead Protocols
58 min
A Journey to Coax Out Chips' Inner Secrets
61 min
A Deep Technical Analysis
54 min
Do you care about Matroshka processors?
60 min
Piecing together the missing bits
29 min
The untold story of what really happened, how it was…
50 min
What went wrong, how the Internet reacted, what we can…
58 min
Industrial System Ownership
61 min
... or how we battle the daemons of memory safety
55 min
New Bleichenbacher Side Channels and Attacks
61 min
Internet reengineering session
63 min
Moving Beyond Single Points of Failure for Software…
58 min
From the Outside Looking In
32 min
Automatic detection of key-reuse vulnerabilities