36C3: Resource Exhaustion

Security

Full playlist: Video / Audio
Harry Potter and the Not-So-Smart Proxy War
35 min

Harry Potter and the Not-So-Smart Proxy War

Taking a look at a covert CIA virtual fencing solution

Hacking (with) a TPM
37 min

Hacking (with) a TPM

Don't ask what you can do for TPMs, Ask what TPMs can do…

Tales of old: untethering iOS 11
39 min

Tales of old: untethering iOS 11

Spoiler: Apple is bad at patching

The Great Escape of ESXi
40 min

The Great Escape of ESXi

Breaking Out of a Sandboxed Virtual Machine

15 Jahre deutsche Telematikinfrastruktur (TI)
41 min

15 Jahre deutsche Telematikinfrastruktur (TI)

Die Realität beim Arztbesuch nach 15 Jahren Entwicklung…

Hirne Hacken
43 min

Hirne Hacken

Menschliche Faktoren der IT-Sicherheit

It's not safe on the streets... especially for your 3DS!
46 min

It's not safe on the streets... especially for your 3DS!

Exploring a new attack surface on the 3DS

SELECT code_execution FROM * USING SQLite;
46 min

SELECT code_execution FROM * USING SQLite;

--Gaining code execution using a malicious SQLite database

Don't Ruck Us Too Hard - Owning Ruckus AP Devices
48 min

Don't Ruck Us Too Hard - Owning Ruckus AP Devices

3 different RCE vulnerabilities on Ruckus Wireless access…

Leaving legacy behind
52 min

Leaving legacy behind

Reducing carbon footprint of network services with MirageOS…

Cryptography demystified
53 min

Cryptography demystified

An introduction without maths

SigOver + alpha
55 min

SigOver + alpha

Signal overshadowing attack on LTE and its applications

Vehicle immobilization revisited
55 min

Vehicle immobilization revisited

Uncovering and assessing a second authentication mechanism…

ZombieLoad Attack
55 min

ZombieLoad Attack

Leaking Your Recent Memory Operations on Intel CPUs

How to Break PDFs
58 min

How to Break PDFs

Breaking PDF Encryption and PDF Signatures

TamaGo - bare metal Go framework for ARM SoCs.
59 min

TamaGo - bare metal Go framework for ARM SoCs.

Reducing the attack surface with pure embedded Go.

Intel Management Engine deep dive
60 min

Intel Management Engine deep dive

Understanding the ME at the OS and hardware level

On the insecure nature of turbine control systems in power generation
60 min

On the insecure nature of turbine control systems in power generation

A security study of turbine control systems in power…

Boot2root
62 min

Boot2root

Auditing Boot Loaders by Example

Das nützlich-unbedenklich Spektrum
63 min

Das nützlich-unbedenklich Spektrum

Können wir Software bauen, die nützlich /und/ unbedenklich…