continue…
Related to
Attacking Rich Internet Applications
Automatic Identification of Cryptographic Primitives…
51 min
Attacking NFC mobile phones
82 min
We lost the war
73 min