27C3: We Come In Peace

Hacking

Full playlist: Video / Audio
Reverse Engineering the MOS 6502 CPU
51 min

Reverse Engineering the MOS 6502 CPU

3510 transistors in 60 minutes

Console Hacking 2010
44 min

Console Hacking 2010

PS3 Epic Fail

OMG WTF PDF
57 min

OMG WTF PDF

What you didn't know about Acrobat

"Die gesamte Technik ist sicher"
60 min

"Die gesamte Technik ist sicher"

Besitz und Wissen: Relay-Angriffe auf den neuen…

Cybernetics for the Masses
39 min

Cybernetics for the Masses

implants, sensory extension and silicon - all for you!

JTAG/Serial/FLASH/PCB Embedded Reverse Engineering Tools and Techniques
56 min

JTAG/Serial/FLASH/PCB Embedded Reverse Engineering Tools and Techniques

a dump of simple tools for embedded analysis at many layers

Running your own GSM stack on a phone
61 min

Running your own GSM stack on a phone

Introducing Project OsmocomBB

Android geolocation using GSM network
63 min

Android geolocation using GSM network

"Where was Waldroid?"

Reverse Engineering a real-world RFID payment system
58 min

Reverse Engineering a real-world RFID payment system

Corporations enabling citizens to print digital money

SMS-o-Death
61 min

SMS-o-Death

From analyzing to attacking mobile phones on a large scale.

Chip and PIN is Broken
57 min

Chip and PIN is Broken

Vulnerabilities in the EMV Protocol

The Baseband Apocalypse
66 min

The Baseband Apocalypse

all your baseband are belong to us

Data Recovery Techniques
60 min

Data Recovery Techniques

Fun with Hard Drives

Defense is not dead
64 min

Defense is not dead

Why we will have more secure computers - tomorrow

The Hidden Nemesis
47 min

The Hidden Nemesis

Backdooring Embedded Controllers

Distributed FPGA Number Crunching For The Masses
56 min

Distributed FPGA Number Crunching For The Masses

How we obtained the equivalent power of a Deep Crack for a…

Contemporary Profiling of Web Users
54 min

Contemporary Profiling of Web Users

On Using Anonymizers and Still Get Fucked

hacking smart phones
73 min

hacking smart phones

expanding the attack surface and then some

Part-Time Scientists
59 min

Part-Time Scientists

One year of Rocket Science!

Having fun with RTP
36 min

Having fun with RTP

„Who is speaking???“

Rootkits and Trojans on Your SAP Landscape
76 min

Rootkits and Trojans on Your SAP Landscape

SAP Security and the Enterprise

Data Analysis in Terabit Ethernet Traffic
50 min

Data Analysis in Terabit Ethernet Traffic

Solutions for monitoring and lawful interception within a…

Lying To The Neighbours
34 min

Lying To The Neighbours

Nasty effects with tracker-less BitTorrent

I Control Your Code
62 min

I Control Your Code

Attack Vectors Through the Eyes of Software-based Fault…

SIP home gateways under fire
25 min

SIP home gateways under fire

Source routing attacks applied to SIP

FrozenCache
55 min

FrozenCache

Mitigating cold-boot attacks for Full-Disk-Encryption…

Secure communications below the hearing threshold
57 min

Secure communications below the hearing threshold

Improved approaches for auditive steganography

Zero-sized heap allocations vulnerability analysis
65 min

Zero-sized heap allocations vulnerability analysis

Applications of theorem proving for securing the windows…