Search for "overflo"

TrustZone is not enough
31 min

TrustZone is not enough

Hijacking debug components for embedded security

SELECT code_execution FROM * USING SQLite;
46 min

SELECT code_execution FROM * USING SQLite;

--Gaining code execution using a malicious SQLite database

Viva la Vita Vida
56 min

Viva la Vita Vida

Hacking the most secure handheld console

What The Fax?!
46 min

What The Fax?!

Hacking your network likes it's 1980 again

Apple's iPhone 15: Under the C
36 min

Apple's iPhone 15: Under the C

Hardware hacking tooling for the new iPhone generation

Open Source Firmware
49 min

Open Source Firmware

Eine Liebesgeschichte

Breaking "DRM" in Polish trains
61 min

Breaking "DRM" in Polish trains

Reverse engineering a train to analyze a suspicious…

The Mars Rover On-board Computer
43 min

The Mars Rover On-board Computer

How Curiosity's Onboard Computer works, and what you can…

eMMC hacking, or: how I fixed long-dead Galaxy S3 phones
56 min

eMMC hacking, or: how I fixed long-dead Galaxy S3 phones

A journey on how to fix broken proprietary hardware by…

Practical Mix Network Design
46 min

Practical Mix Network Design

Strong metadata protection for asynchronous messaging

In Search of Evidence-Based IT-Security
30 min

In Search of Evidence-Based IT-Security

IT security is largely a science-free field. This needs to…