Events for tag "Security"
60 min
Enforcing strong network segmentation, without anyone…
46 min
Finding interesting targets in 128bit of entropy
46 min
...or the 37th floor of a Hotel
22 min
On Fitbit Firmware Modifications and Data Extraction
43 min
Menschliche Faktoren der IT-Sicherheit
30 min
The Red Pill of N26 Security
56 min
Hacking the most secure handheld console
59 min
Zugänge und Daten mit privacyIDEA absichern
60 min
A critical look on a new audio Format
32 min
A long way to a vibrant future
62 min
Pure capability-based security for UNIX
36 min
Hardware hacking tooling for the new iPhone generation
60 min
How private companies leak your personal data into the…
44 min
teaching a new dog old tricks
41 min
Die Realität beim Arztbesuch nach 15 Jahren Entwicklung…
43 min
The dilemma of DNS privacy protocols
51 min
Wie der Weg ins digitale Zuhause zum Spaziergang wird
61 min
Security und Privacy mit LXC et.al. - auch auf…
39 min
When your browser is mining coins for other people
63 min
Können wir Software bauen, die nützlich /und/ unbedenklich…
60 min
The potential for payment system abuse
42 min
Real-world exploits and mitigations in Large Language Model…
37 min
(Ab)Using AMD Microcode for fun and security
49 min
Ways to Chaos in Digital and Analogue Electronics
46 min
Hacking your network likes it's 1980 again
36 min
Hardware implants in the supply-chain
54 min
An introduction to reverse engineering network protocols
49 min
How to hack software defined network and keep your sanity?
60 min
How not to do DOCSIS networks
40 min
Owning machines through relaying and delegation
67 min
Eine Einführung in die digitale Forensik und ihre…
59 min
Becoming a secret travel agent
61 min
SSL/TLS Zertifikate mit DNSSEC absichern
33 min
Intrusion and Exfiltration in Server-less Architectures
37 min
Don't ask what you can do for TPMs, Ask what TPMs can do…
60 min
A gentle introduction to post-quantum cryptography
49 min
How to turn your KVM into a raging key-logging monster
63 min
TETRA unlocked after decades in the shadows
41 min
Nym Anonymous Authentication Credentials
60 min
Making it easier to avoid low-level compromise, and why…
59 min
Was ist neu in privacyIDEA
44 min
Retiring the BSD Socket API
63 min
Secure Boot und TPM gestützte LUKS…
57 min
A demystification of the exploit development lifecycle
60 min
Understanding the ME at the OS and hardware level
42 min
Finishing off the Nintendo DSi
60 min
How to drop more of your privileges to reduce attack…
45 min
Lerne in unter einer Stunde, AppArmor-Profile zu erstellen…
39 min
Vom Fall der letzten Bastion biometrischer Systeme
41 min
Security Of Railway Communication Protocols
58 min
What You Get When Attack iPhones of Researchers
58 min
An Exploration of NFC Transactions and Explanation How…
56 min
New security recommendations for OAuth
52 min
Who is the root on your router?
64 min
(Not Only) Attacks on OAuth and OpenID Connect
60 min
Eine Reise auf die dunkle Seite
60 min
Living with a vulnerable implanted device
35 min
How (not) to protect private keys
59 min
On the Privacy & Security of the Ultrasound Tracking…
62 min
Wie man Stalkerware und Staatstrojaner auf Smartphones…
39 min
Spoiler: Apple is bad at patching
58 min
weaknesses in the encryption of solid state drives (SSDs)
46 min
--Gaining code execution using a malicious SQLite database
56 min
an introduction to quantum cryptography for sysadmins and…
57 min
An introduction into reverse-engineering x86 microcode and…
55 min
Towards an open source binary firmware analysis framework
59 min
A tale of 3 different memory deduplication based…
55 min
Leaking Your Recent Memory Operations on Intel CPUs
53 min
Zwei-Faktor Authentisierung in der Praxis
43 min
Fun and games until someone uses IPv6 or TCP
42 min
Or how to become your own ISP
43 min
The Road to Mobile Tor and Improved Censorship Circumvention
40 min
Breaking Out of a Sandboxed Virtual Machine
63 min
A gentle introduction to mobile messaging and subsequent…
55 min
Side effects include side-channel attacks and bypassing…
46 min
Redesigning NoScript’s UX
46 min
Analyzing & Breaking Exploit Mitigations and Secure Random…
57 min
50% Talk 50% Live-Session to try out some code yourself
37 min
Realisierung einer Hochverfügbarkeitslösung mit dynamischem…
46 min
Exploring a new attack surface on the 3DS
61 min
Tamper Proofing Commodity Hardware and other Applications
44 min
Practical cache attacks on the MMU
60 min
How the NSA open-sourced all software in 2019
58 min
Lessons Learned & Praxistipps
53 min
An introduction without maths
61 min
A proposal for secure computing in an age where we cannot…
57 min
Cryptomator is a multi-platform, client-side encryption…
40 min
Advanced QEMU-based fuzzing
39 min
a story of vulnerability after vulnerability
65 min
Fun with lattices in cryptography and cryptanalysis
47 min
Anonymes Netzwerk basierend auf dem Kleine-Welt-Phänomen
52 min
How I Learned to Stop Worrying and Love the Backdoor
59 min
Shamir secret sharing: How it works and how to implement it
64 min
Dissecting a Modern Wireless Network for the Internet of…
61 min
"So sicher wie beim Online-Banking": Die elektronische…
55 min
Signal overshadowing attack on LTE and its applications
54 min
Unlocking God Mode on Linux
51 min
(without your mom yelling at you)
57 min
From DEFCON to the DARPA Cyber Grand Challenge
45 min
Hacking industrial control gateways
49 min
Nur einmal authentisiert - aber stark!
63 min
Is your data secure by default? How Django can be used to…
39 min
The cybersecurity dark side of solar energy when clouds are…
52 min
Warum das Laden eines Elektroautos unsicher ist
29 min
Wireless Physical Layer Security & More...
58 min
A survey of BSD kernel vulnerabilities.
60 min
A semantics based approach
38 min
Uncovering fake base stations on iOS devices
55 min
Uncovering and assessing a second authentication mechanism…
40 min
Decrypting files hijacked by the "second most used…
52 min
Reducing carbon footprint of network services with MirageOS…
56 min
A journey on how to fix broken proprietary hardware by…
31 min
Hijacking debug components for embedded security
38 min
Explaining in detail just how those little COM files…
40 min
Call the frontdoor to install your backdoors
59 min
Reducing the attack surface with pure embedded Go.
42 min
Hierarchical decentralized naming system used since 30 years
70 min
A study of weaknesses in the pipeline of rapidly advancing…
51 min
Wie wir die Asymmetrien überwinden können
36 min
Analyzing Embedded OS Random Number Generators
49 min
Exploiting Free Data Channels and Security Problems
54 min
Über „Girodays“ & anderen Kuriositäten
41 min
Recovering Critical Data from Tesla Autopilot Using Voltage…
37 min
A systemic update of sensitive information that you sniff…
59 min
Breaking and fixing the Bluetooth standard. One More Time.
41 min
why+how to create bit by bit identical binary packages
36 min
A deep dive into an underrepresented research area
43 min
how to make NetBSD a better software for you and me
59 min
A Journey in the Land of (Cyber-)Espionage
59 min
Ein Fahrplan für ein mehr an Informationssicherheit in…
29 min
Technical Teardown of the Pegasus malware and Trident…
60 min
Or how I learned to stop worrying and love urandom
59 min
How I learned to stop worrying and love the backdoor
41 min
A beginner-friendly guide to network segmentation for…
33 min
(with Kubernetes this time)
60 min
How advanced threat actors learn and change with innovation…
60 min
Efail, other attacks and lessons learned.
59 min
Large Scale Authorship Attribution from Executable Binaries…
58 min
Ein Computerwurm für PLCs
43 min
Exploiting and protecting containers with a few lines of…
62 min
Auditing Boot Loaders by Example
54 min
Reliably finding bugs to escape the Chrome sandbox
65 min
Find and fix vulnerabilities before they reach production.
58 min
Breaking PDF Encryption and PDF Signatures
35 min
Taking a look at a covert CIA virtual fencing solution
57 min
A Native Developer's Account On SSL
60 min
A security study of turbine control systems in power…
48 min
3 different RCE vulnerabilities on Ruckus Wireless access…
30 min
A tale of fault attacks on DRAM and attacks on CPU caches
57 min
Cloud computing meets fine-grained capabilities
46 min
Was kann man noch retten, wenn langlebigen Strukturen…
25 min
(und wie gute Architektur das verhindert)
51 min
Secure Boot support in qemu, kvm and ovmf.
65 min
Outnumbering cybercriminals might be an option
51 min
An AES encrypted radio system
61 min
Hacking the most popular cryptocurrency hardware wallets
45 min
From Research over Vulnerability Discovery to Public…
61 min
why clearing memory is hard.
38 min
Aarch64 binary rewriting adventures but mostly pains
49 min
secure your apps and servers through continuous integration
30 min
Über die (Un-)Sicherheit eines Bezahlsystems
61 min
Improving the encrypted the web, one round-trip at a time