54 min
Über „Girodays“ & anderen Kuriositäten
38 min
Uncovering fake base stations on iOS devices
62 min
Wie man Stalkerware und Staatstrojaner auf Smartphones…
42 min
Real-world exploits and mitigations in Large Language Model…
59 min
Breaking and fixing the Bluetooth standard. One More Time.
39 min
The cybersecurity dark side of solar energy when clouds are…
38 min
Aarch64 binary rewriting adventures but mostly pains
42 min
Finishing off the Nintendo DSi
40 min
Advanced QEMU-based fuzzing
41 min
Security Of Railway Communication Protocols
40 min
Decrypting files hijacked by the "second most used…
63 min
TETRA unlocked after decades in the shadows
58 min
What You Get When Attack iPhones of Researchers
41 min
Recovering Critical Data from Tesla Autopilot Using Voltage…
36 min
A deep dive into an underrepresented research area
36 min
Hardware hacking tooling for the new iPhone generation