34C3: TUWAT

Security

Full playlist: Video / Audio
TrustZone is not enough
31 min

TrustZone is not enough

Hijacking debug components for embedded security

SCADA - Gateway to (s)hell
45 min

SCADA - Gateway to (s)hell

Hacking industrial control gateways

MQA - A clever stealth DRM-Trojan
60 min

MQA - A clever stealth DRM-Trojan

A critical look on a new audio Format

Decoding Contactless (Card) Payments
58 min

Decoding Contactless (Card) Payments

An Exploration of NFC Transactions and Explanation How…

Are all BSDs created equally?
58 min

Are all BSDs created equally?

A survey of BSD kernel vulnerabilities.

avatar²
55 min

avatar²

Towards an open source binary firmware analysis framework

Console Security - Switch
56 min

Console Security - Switch

Homebrew on the Horizon

ASLR on the line
44 min

ASLR on the line

Practical cache attacks on the MMU

LatticeHacks
65 min

LatticeHacks

Fun with lattices in cryptography and cryptanalysis

How to drift with any car
51 min

How to drift with any car

(without your mom yelling at you)

We should share our secrets
59 min

We should share our secrets

Shamir secret sharing: How it works and how to implement it

Electromagnetic Threats for Information Security
49 min

Electromagnetic Threats for Information Security

Ways to Chaos in Digital and Analogue Electronics

Taking a scalpel to QNX
46 min

Taking a scalpel to QNX

Analyzing & Breaking Exploit Mitigations and Secure Random…

Everything you want to know about x86 microcode, but might have been afraid to ask
57 min

Everything you want to know about x86 microcode, but might have been afraid to ask

An introduction into reverse-engineering x86 microcode and…

eMMC hacking, or: how I fixed long-dead Galaxy S3 phones
56 min

eMMC hacking, or: how I fixed long-dead Galaxy S3 phones

A journey on how to fix broken proprietary hardware by…

DPRK Consumer Technology
31 min

DPRK Consumer Technology

Facts to fight lore

Doping your Fitbit
22 min

Doping your Fitbit

On Fitbit Firmware Modifications and Data Extraction

Lets break modern binary code obfuscation
60 min

Lets break modern binary code obfuscation

A semantics based approach

Ladeinfrastruktur für Elektroautos: Ausbau statt Sicherheit
52 min

Ladeinfrastruktur für Elektroautos: Ausbau statt Sicherheit

Warum das Laden eines Elektroautos unsicher ist