35C3: Refreshing Memories

Security

Full playlist: Video / Audio
Internet of Dongs
32 min

Internet of Dongs

A long way to a vibrant future

Wallet Security
35 min

Wallet Security

How (not) to protect private keys

Modchips of the State
36 min

Modchips of the State

Hardware implants in the supply-chain

Inside the AMD Microcode ROM
37 min

Inside the AMD Microcode ROM

(Ab)Using AMD Microcode for fun and security

A deep dive into the world of DOS viruses
38 min

A deep dive into the world of DOS viruses

Explaining in detail just how those little COM files…

Web-based Cryptojacking in the Wild
39 min

Web-based Cryptojacking in the Wild

When your browser is mining coins for other people

Venenerkennung hacken
39 min

Venenerkennung hacken

Vom Fall der letzten Bastion biometrischer Systeme

Domain Name System
42 min

Domain Name System

Hierarchical decentralized naming system used since 30 years

What The Fax?!
46 min

What The Fax?!

Hacking your network likes it's 1980 again

Jailbreaking iOS
47 min

Jailbreaking iOS

From past to present

SD-WAN a New Hop
49 min

SD-WAN a New Hop

How to hack software defined network and keep your sanity?

Smart Home - Smart Hack
51 min

Smart Home - Smart Hack

Wie der Weg ins digitale Zuhause zum Spaziergang wird

SiliVaccine: North Korea's Weapon of Mass Detection
52 min

SiliVaccine: North Korea's Weapon of Mass Detection

How I Learned to Stop Worrying and Love the Backdoor

Kernel Tracing With eBPF
54 min

Kernel Tracing With eBPF

Unlocking God Mode on Linux

Attacking Chrome IPC
54 min

Attacking Chrome IPC

Reliably finding bugs to escape the Chrome sandbox

Viva la Vita Vida
56 min

Viva la Vita Vida

Hacking the most secure handheld console

The Layman's Guide to Zero-Day Engineering
57 min

The Layman's Guide to Zero-Day Engineering

A demystification of the exploit development lifecycle

Self-encrypting deception
58 min

Self-encrypting deception

weaknesses in the encryption of solid state drives (SSDs)

Provable Security
59 min

Provable Security

How I learned to stop worrying and love the backdoor

Attacking end-to-end email encryption
60 min

Attacking end-to-end email encryption

Efail, other attacks and lessons learned.

Sneaking In Network Security
60 min

Sneaking In Network Security

Enforcing strong network segmentation, without anyone…

Enclosure-PUF
61 min

Enclosure-PUF

Tamper Proofing Commodity Hardware and other Applications

Memsad
61 min

Memsad

why clearing memory is hard.

All Your Gesundheitsakten Are Belong To Us
61 min

All Your Gesundheitsakten Are Belong To Us

"So sicher wie beim Online-Banking": Die elektronische…

wallet.fail
61 min

wallet.fail

Hacking the most popular cryptocurrency hardware wallets