Events for tag "Security"
25 min
(und wie gute Architektur das verhindert)
55 min
Signal overshadowing attack on LTE and its applications
58 min
An Exploration of NFC Transactions and Explanation How…
33 min
(with Kubernetes this time)
61 min
Improving the encrypted the web, one round-trip at a time
32 min
A long way to a vibrant future
42 min
Or how to become your own ISP
70 min
A study of weaknesses in the pipeline of rapidly advancing…
58 min
Ein Computerwurm für PLCs
63 min
Können wir Software bauen, die nützlich /und/ unbedenklich…
62 min
Pure capability-based security for UNIX
61 min
"So sicher wie beim Online-Banking": Die elektronische…
38 min
Aarch64 binary rewriting adventures but mostly pains
63 min
Secure Boot und TPM gestützte LUKS…
37 min
Realisierung einer Hochverfügbarkeitslösung mit dynamischem…
61 min
Tamper Proofing Commodity Hardware and other Applications
37 min
(Ab)Using AMD Microcode for fun and security
60 min
Enforcing strong network segmentation, without anyone…
61 min
SSL/TLS Zertifikate mit DNSSEC absichern
58 min
Breaking PDF Encryption and PDF Signatures
39 min
a story of vulnerability after vulnerability
29 min
Wireless Physical Layer Security & More...
41 min
Nym Anonymous Authentication Credentials
67 min
Eine Einführung in die digitale Forensik und ihre…
46 min
Exploring a new attack surface on the 3DS
58 min
A survey of BSD kernel vulnerabilities.
53 min
An introduction without maths
57 min
From DEFCON to the DARPA Cyber Grand Challenge
44 min
Retiring the BSD Socket API
42 min
Hierarchical decentralized naming system used since 30 years
22 min
On Fitbit Firmware Modifications and Data Extraction
35 min
How (not) to protect private keys
36 min
A deep dive into an underrepresented research area
40 min
Breaking Out of a Sandboxed Virtual Machine
30 min
Über die (Un-)Sicherheit eines Bezahlsystems
45 min
Lerne in unter einer Stunde, AppArmor-Profile zu erstellen…
52 min
Warum das Laden eines Elektroautos unsicher ist
58 min
weaknesses in the encryption of solid state drives (SSDs)
43 min
Menschliche Faktoren der IT-Sicherheit
62 min
Wie man Stalkerware und Staatstrojaner auf Smartphones…
61 min
why clearing memory is hard.
39 min
When your browser is mining coins for other people
60 min
How advanced threat actors learn and change with innovation…
61 min
Hacking the most popular cryptocurrency hardware wallets
36 min
Hardware hacking tooling for the new iPhone generation
41 min
Recovering Critical Data from Tesla Autopilot Using Voltage…
58 min
What You Get When Attack iPhones of Researchers
41 min
Security Of Railway Communication Protocols
53 min
Zwei-Faktor Authentisierung in der Praxis
57 min
A Native Developer's Account On SSL
51 min
Wie wir die Asymmetrien überwinden können
42 min
Real-world exploits and mitigations in Large Language Model…
52 min
Reducing carbon footprint of network services with MirageOS…
55 min
Uncovering and assessing a second authentication mechanism…
65 min
Fun with lattices in cryptography and cryptanalysis
39 min
The cybersecurity dark side of solar energy when clouds are…
60 min
A gentle introduction to post-quantum cryptography
55 min
Leaking Your Recent Memory Operations on Intel CPUs
52 min
Who is the root on your router?
56 min
Hacking the most secure handheld console
40 min
Call the frontdoor to install your backdoors
49 min
Exploiting Free Data Channels and Security Problems
56 min
A journey on how to fix broken proprietary hardware by…
41 min
Die Realität beim Arztbesuch nach 15 Jahren Entwicklung…
42 min
Finishing off the Nintendo DSi
35 min
Taking a look at a covert CIA virtual fencing solution
62 min
Auditing Boot Loaders by Example
59 min
Zugänge und Daten mit privacyIDEA absichern
60 min
How private companies leak your personal data into the…
47 min
Anonymes Netzwerk basierend auf dem Kleine-Welt-Phänomen
57 min
An introduction into reverse-engineering x86 microcode and…
60 min
Understanding the ME at the OS and hardware level
58 min
Lessons Learned & Praxistipps
56 min
New security recommendations for OAuth
46 min
Was kann man noch retten, wenn langlebigen Strukturen…
65 min
Outnumbering cybercriminals might be an option
63 min
A gentle introduction to mobile messaging and subsequent…
43 min
The Road to Mobile Tor and Improved Censorship Circumvention
29 min
Technical Teardown of the Pegasus malware and Trident…
46 min
Redesigning NoScript’s UX
49 min
How to turn your KVM into a raging key-logging monster
61 min
Security und Privacy mit LXC et.al. - auch auf…
60 min
Eine Reise auf die dunkle Seite
38 min
Explaining in detail just how those little COM files…
46 min
...or the 37th floor of a Hotel
45 min
Hacking industrial control gateways
49 min
Nur einmal authentisiert - aber stark!
48 min
3 different RCE vulnerabilities on Ruckus Wireless access…
46 min
Analyzing & Breaking Exploit Mitigations and Secure Random…
57 min
Cryptomator is a multi-platform, client-side encryption…
60 min
Living with a vulnerable implanted device
36 min
Analyzing Embedded OS Random Number Generators
64 min
Dissecting a Modern Wireless Network for the Internet of…
44 min
Practical cache attacks on the MMU
56 min
an introduction to quantum cryptography for sysadmins and…
59 min
Reducing the attack surface with pure embedded Go.
60 min
A critical look on a new audio Format
41 min
why+how to create bit by bit identical binary packages
46 min
Finding interesting targets in 128bit of entropy
54 min
Reliably finding bugs to escape the Chrome sandbox
43 min
The dilemma of DNS privacy protocols
40 min
Owning machines through relaying and delegation
63 min
TETRA unlocked after decades in the shadows
54 min
An introduction to reverse engineering network protocols
40 min
Decrypting files hijacked by the "second most used…
49 min
How to hack software defined network and keep your sanity?
55 min
Towards an open source binary firmware analysis framework
57 min
A demystification of the exploit development lifecycle
39 min
Spoiler: Apple is bad at patching
60 min
A semantics based approach
51 min
Secure Boot support in qemu, kvm and ovmf.
37 min
Don't ask what you can do for TPMs, Ask what TPMs can do…
59 min
A tale of 3 different memory deduplication based…
41 min
A beginner-friendly guide to network segmentation for…
63 min
Is your data secure by default? How Django can be used to…
59 min
Ein Fahrplan für ein mehr an Informationssicherheit in…
31 min
Hijacking debug components for embedded security
59 min
How I learned to stop worrying and love the backdoor
59 min
Becoming a secret travel agent
51 min
Wie der Weg ins digitale Zuhause zum Spaziergang wird
39 min
Vom Fall der letzten Bastion biometrischer Systeme
60 min
The potential for payment system abuse
45 min
From Research over Vulnerability Discovery to Public…
51 min
(without your mom yelling at you)
46 min
Hacking your network likes it's 1980 again
46 min
--Gaining code execution using a malicious SQLite database
64 min
(Not Only) Attacks on OAuth and OpenID Connect
59 min
A Journey in the Land of (Cyber-)Espionage
37 min
A systemic update of sensitive information that you sniff…
65 min
Find and fix vulnerabilities before they reach production.
55 min
Side effects include side-channel attacks and bypassing…
60 min
How the NSA open-sourced all software in 2019
43 min
Exploiting and protecting containers with a few lines of…
40 min
Advanced QEMU-based fuzzing
61 min
A proposal for secure computing in an age where we cannot…
44 min
teaching a new dog old tricks
59 min
Breaking and fixing the Bluetooth standard. One More Time.
60 min
A security study of turbine control systems in power…
59 min
Was ist neu in privacyIDEA
60 min
How to drop more of your privileges to reduce attack…
30 min
A tale of fault attacks on DRAM and attacks on CPU caches
54 min
Über „Girodays“ & anderen Kuriositäten
51 min
An AES encrypted radio system
57 min
50% Talk 50% Live-Session to try out some code yourself
59 min
Large Scale Authorship Attribution from Executable Binaries…
49 min
secure your apps and servers through continuous integration
57 min
Cloud computing meets fine-grained capabilities
30 min
The Red Pill of N26 Security
38 min
Uncovering fake base stations on iOS devices
43 min
how to make NetBSD a better software for you and me
60 min
Efail, other attacks and lessons learned.
54 min
Unlocking God Mode on Linux
49 min
Ways to Chaos in Digital and Analogue Electronics
52 min
How I Learned to Stop Worrying and Love the Backdoor
60 min
How not to do DOCSIS networks
59 min
On the Privacy & Security of the Ultrasound Tracking…
60 min
Or how I learned to stop worrying and love urandom
60 min
Making it easier to avoid low-level compromise, and why…
43 min
Fun and games until someone uses IPv6 or TCP
59 min
Shamir secret sharing: How it works and how to implement it
36 min
Hardware implants in the supply-chain
33 min
Intrusion and Exfiltration in Server-less Architectures