Search for "maggic" returned 357 results

Quantum Cryptography
60 min

Quantum Cryptography

from key distribution to position-based cryptography

Intel Management Engine deep dive
60 min

Intel Management Engine deep dive

Understanding the ME at the OS and hardware level

SELECT code_execution FROM * USING SQLite;
46 min

SELECT code_execution FROM * USING SQLite;

--Gaining code execution using a malicious SQLite database

Fuzzing the phone in the iPhone
55 min

Fuzzing the phone in the iPhone

D-d-d-di-di-d-d-di-d-di-d-di-d-dimm!

Kernel Tracing With eBPF
54 min

Kernel Tracing With eBPF

Unlocking God Mode on Linux

Holography of Wi-Fi radiation
61 min

Holography of Wi-Fi radiation

Can we see the stray radiation of wireless devices? And…

Low Cost High Speed Photography
60 min

Low Cost High Speed Photography

Using microcontrollers to capture the blink of an eye for…

Infocalypse now: P0wning stuff is not enough
29 min

Infocalypse now: P0wning stuff is not enough

Several failure modes of the hacker scene

eMMC hacking, or: how I fixed long-dead Galaxy S3 phones
56 min

eMMC hacking, or: how I fixed long-dead Galaxy S3 phones

A journey on how to fix broken proprietary hardware by…

Pointing Fingers at 'The Media'
59 min

Pointing Fingers at 'The Media'

The Bundestagswahl 2017 and Rise of the AfD

Cyber Necromancy
55 min

Cyber Necromancy

Reverse Engineering Dead Protocols

What de.fac2?
29 min

What de.fac2?

Attacking an opensource U2F device in 30 minutes or less