36 min
A deep dive into an underrepresented research area
36 min
Hardware hacking tooling for the new iPhone generation
38 min
Uncovering fake base stations on iOS devices
38 min
Aarch64 binary rewriting adventures but mostly pains
39 min
The cybersecurity dark side of solar energy when clouds are…
40 min
Decrypting files hijacked by the "second most used…
40 min
Advanced QEMU-based fuzzing
41 min
Recovering Critical Data from Tesla Autopilot Using Voltage…
41 min
Security Of Railway Communication Protocols
42 min
Finishing off the Nintendo DSi
42 min
Real-world exploits and mitigations in Large Language Model…
54 min
Über „Girodays“ & anderen Kuriositäten
58 min
What You Get When Attack iPhones of Researchers
59 min
Breaking and fixing the Bluetooth standard. One More Time.
62 min
Wie man Stalkerware und Staatstrojaner auf Smartphones…
63 min
TETRA unlocked after decades in the shadows