Search for "Alissa"
66 min
Harnessing diagnostics for baseband vulnerability research
46 min
--Gaining code execution using a malicious SQLite database
40 min
Techniques - Tools - Tricks
44 min
Tech unexeptionalism and the monopolization of every…
60 min
...or why adding BTLE to a device sometimes isn't smart at…