2024-02-11 | marion marschalek Bubble Struggle Call Graph Visualization with Radare2 | 1:02:45 | 2 | |
|
2024-02-11 | michael atlas SGX Enclave programming common mistakes | 46:24 | 0 | |
|
2024-02-11 | adam schwalm Exporting IDA Debug Information | 23:55 | 0 | Guide |
|
2024-02-11 | alex ionescu Fun with Sam Inside the Surface Aggregator Module | 57:06 | 0 | |
|
2024-02-11 | andrea allievi The HyperV Architecture and its Memory Manager | 56:06 | 0 | |
|
2024-02-11 | david carne HDI PCB Netlist Recovery a new old technique | 31:20 | 0 | |
|
2024-02-11 | fabrice desclaux camille mougey Miasm reverse engineering framework | 54:06 | 0 | |
|
2024-02-11 | Juan Andres Guerrero Saade Mining Disputed territories Studying Attacker Signatures for Improved Sit | 49:32 | 1 | |
|
2024-02-11 | Thomas Roth Dmitry Nedospasov Hacking the most popular cryptocurrency hardware wallets 90dZWqWdV43 | 41:37 | 0 | |
|
2024-02-11 | Maddie Stone The path to the payload Android Edition J3ZnNl2GYjEfa | 35:11 | 0 | |
|
2024-02-11 | Matt Graeber Using WPP and TraceLogging Tracing to Facilitate Dynamic and Static Windows RE 4wrctkSI | 54:35 | 0 | Vlog |
|
2024-02-11 | Alex Ionescu The Last Generic Win32K KASLR Defeat in Windows uXzcEpxt54ybs | 55:29 | 0 | |
|
2024-02-11 | Natalie Silvanovitch Seeing Inside the Encrypted Envelope M8rga9e8H27Ee | 58:18 | 0 | |
|
2024-02-11 | Alex Radocea Snow Crashing Virtual Reality 2019 Edition a45zewC5K1XGs | 43:25 | 2 | |
|
2024-02-11 | Rolf Rolles Automation Techniques in C Reverse Engineering 8jKapmZP0gND6 | 1:02:01 | 1 | |
|
2024-02-11 | Bill DemirKapi The Unseen Dangers of Bloatware SWuxeYIcvlfia | 34:21 | 2 | |
|
2024-02-11 | Brandon Falk Vectorized Emulation Putting it all together kFn8Kr6lsNZQZ | 58:18 | 0 | |
|
2024-02-11 | Slava Makkaveev The Road to Qualcomm Trust Zone apps fuzzing IyiuvOcbuGOAP | 29:07 | 0 | |
|
2024-02-11 | Takahiro Haruyama Defeating APT10 Compiler level Obfuscation a36qtx5lpBQnE | 28:59 | 0 | |
|
2024-02-11 | Chris Gerlinsky The ROM matric revolution Unscrambling bits K0W7zZQDK9lQQ | 35:48 | 1 | |
|
2024-02-11 | Colin O'Flynn MINimum Failure Stealing Bitcoins with Electromagnetic Fault Injection 5qYAlMcGKMoEb | 26:06 | 0 | |
|
2024-02-11 | Dimitrios Tatsis Attacking Hexagon Security Analysis of Qualcomm's ADSP lxNbsl2gW7w0e | 44:53 | 0 | |
|
2024-02-11 | Evan Jensen The Backdoor Foundry A Tool chain for Building Application Specific Implants TU4e6qaSW6H | 27:53 | 0 | |
|
2024-02-11 | George Tarnovsky X Ray Reverse Engineering uj9LDNtRWRwUG | 23:08 | 3 | |
|
2024-02-11 | Guy Burned in AshesBaseband Fairy Tale Stories WXoRdFBuXytGB | 32:11 | 0 | |
|
2024-02-11 | Jiska Dennis Mantz Reversing and Exploiting Broadcom Bluetooth dEpC4S0krzxuc | 56:09 | 4 | |
|
2024-02-11 | Joan Calvet The long journey To A MultiArchitecture Disassembler fgmt6TlB2UkKi | 1:03:48 | 0 | |
|
2024-02-11 | Joel Noguera Unveiling the Underground world of Anti Cheats XU7k7Iwba695M | 50:19 | 0 | |
|
2024-02-11 | Simon Scannell Remotely Exploiting An Antivirus Engine | 28:28 | 0 | |
|
2024-02-11 | Tal Lossos NVMe | 34:51 | 0 | |
|
2024-02-11 | Willy R Vasquez The Most Dangerous Codec In The World Vulnerabilities in H 264 | 29:46 | 0 | |
|
2024-02-11 | & Pete Markowsky | 0:15 | 0 | |
|
2024-02-11 | Tim Blazytko Unveiling Secrets In Binaries using Code Detection Strategies | 34:29 | 0 | |
|
2024-02-11 | bold Cracking the final frontier Reverse engineering and exploiting LEO satellites | 1:02:33 | 0 | |
|
2024-02-11 | Travis Goodspeed Recent Experiments with Mask ROMs | 55:34 | 0 | |
|
2024-02-11 | Colin O'Flynn Adventures of My Oven Pinocchio with ChipWhisperer | 36:10 | 0 | |
|
2024-02-11 | Vitor Ventura & Holger Unterbringe Reversing NIM Binaries | 45:32 | 0 | |
|
2024-02-11 | Daniel Wegemer Enabling Security Research On Qualcomm Wifi Chips | 45:42 | 1 | |
|
2024-02-11 | Erik Egsgard The Hunt for Red October One Ping Too Many | 48:40 | 1 | |
|
2024-02-11 | Ice Ice Baby Coppin' RAM With DIY Cryo Mechanical Robot | 48:07 | 0 | |
|
2024-02-11 | Mathilde Venault Press Play To Restart Under the Hood of the Windows Restart Manager | 35:57 | 1 | |
|
2024-02-11 | Maxime Rossi and Damiano Melotti Dissecting the Modern Android Data Encryption Scheme | 53:33 | 0 | |
|
2024-02-11 | Michael Harbison Hello 1994Abusing Windows Explorer via Component Object Model in 2023 | 28:21 | 1 | |
|
2024-02-11 | Natalie Silvanovich How To Hack Shannon Baseband | 54:15 | 0 | Guide |
|
2024-02-11 | Nick Gregory & Pete Markowsky Be Kind Please Rewind | 42:17 | 0 | |
|
2024-02-11 | Nika Korchok Portrait of the artist as a young vx er This painting is an MBR bootkit | 27:52 | 0 | |
|
2024-02-11 | Olivia Locca Fraser Backdoor Lockpick | 1:12:21 | 0 | |
|
2024-02-11 | Game of Phones Global Telcos on Transparency, Regulatory Restrictions, and Human Rights | 1:10:11 | 0 | |
|
2024-02-11 | Home & Away International Parent Company Responsibility for Human Rights | 1:10:14 | 0 | |
|
2024-02-11 | Internet and Jurisdiction How do Competing National Laws Coexist Online | 1:16:19 | 0 | |
|
2024-02-11 | Known Unknowns of the NSA Surveillance Programs | 52:46 | 2 | |
|
2024-02-11 | Losing a Battle We Didn't Know We Were Fighting | 1:10:40 | 0 | |
|
2024-02-11 | MLATS Making Global Data Request Treaties Work for Human Rights | 1:00:07 | 0 | |
|
2024-02-11 | Closing session | 14:44 | 0 | |
|
2024-02-11 | Collateral Freedom Using Global Trade to Reshape Censor Incentives | 56:34 | 0 | |
|
2024-02-11 | Competition, Consumers, and Trolls Why You Should Care About Patents 2 | 1:05:55 | 0 | |
|
2024-02-11 | Creative Conscience Writers on Surveillance, Society, and Culture | 56:27 | 0 | |
|
2024-02-11 | Designing Platforms for Digital Rights @RightsCon 2014 | 1:16:15 | 0 | |
|
2024-02-11 | Designing Platforms for Digital Rights a Fireside Chat with Google, Facebook, and Twitter | 1:18:58 | 1 | |
|
2024-02-11 | Early Stage You Aren't too Small to be Thinking About User RIghts | 1:04:41 | 0 | |
|
2024-02-11 | Encryption TK Securing the Future of Journalism and Human Rights | 46:48 | 0 | |
|
2024-02-11 | Frenemies of the State How to Get Shit Done Without Killing Each Other | 21:02 | 0 | Guide |
|
2024-02-11 | Wrap Session w Andrew McLaughlin, Digg & Yvette Alberdingk Thijm, WITNESS | 8:14 | 0 | |
|
2024-02-11 | Network Neutrality How to Identify Discriminations and Advance Solutions | 1:13:47 | 0 | Guide |
|
2024-02-11 | Opening Ceremony | 43:14 | 0 | |
|
2024-02-11 | Populations on the Front Lines Voices from Ukraine, Uganda, and Turkey | 1:11:30 | 0 | |
|
2024-02-11 | Privatized Enforcement and Corporate Censorship The Future of Freedom of Expression | 1:14:29 | 0 | |
|
2024-02-11 | Protecting User Rights Practical Issues Facing Early Stage Companies | 1:12:32 | 0 | |
|
2024-02-11 | Sao Paulo and Beyond the Future of Global Internet Governance and Beyond | 1:10:21 | 0 | |
|
2024-02-11 | The Building Blocks of Dissent Policy Allies for a Dissident Web | 51:50 | 0 | |
|
2024-02-11 | The NSA Strikes Back Who Really Won the Crypto Wars | 1:03:29 | 0 | |
|
2024-02-11 | The Public Private Surveillance Partnership Myth or Reality | 1:08:41 | 0 | |
|
2024-02-11 | This Mess We're In the Surveillance Landscape and Coercion Resistant Design | 1:03:02 | 0 | |
|
2024-02-11 | Transparency Reporting for Beginners | 1:11:11 | 0 | |
|
2024-02-11 | Uncontrolled Surveillance Regulation and Export Controls | 1:10:27 | 1 | |
|
2024-02-11 | Using Technology to Counter Dangerous Speech When Feed the Trolls Isn't Enough | 1:17:34 | 1 | Vlog |
|
2024-02-11 | Watching the Observers the Impact of Surveillance on Human Rights | 1:11:02 | 1 | |
|
2024-02-10 | jonas zaddach Exploring the impact of a hard drive backdoor | 49:19 | 13 | |
|
2024-02-10 | alex ionescu Apple SMC The place to be definitely For an implant | 58:38 | 7 | |
|
2024-02-10 | andrzej dereszowski FunCap | 27:55 | 2 | |
|
2024-02-10 | steven vittitoe Reverse Engineering Windows AFD sys | 24:30 | 5 | |
|
2024-02-10 | yuriy bulygin oleksandr bazhaniuk Attacking and Defending BIOS in 2015 | 1:07:51 | 1 | |
|
2024-02-10 | travis goodspeed sergey bratus Polyglots and Chimeras in Digital Radio Modes | 1:05:03 | 3 | |
|
2024-02-10 | yaniv balmas 0x3E9 Ways to DIE | 52:15 | 1 | |
|
2024-02-10 | alex ionescu Hooking Nirvana | 1:06:06 | 1 | |
|
2024-02-10 | yong chuan koh Understaning the Microsoft Office Protected View Sandbox | 38:13 | 3 | |
|
2024-02-10 | andrew zonenberg From Silicon to Compiler | 46:31 | 2 | |
|
2024-02-10 | brian gorenc simon zuckerbraun abdul aziz hariri Abusing Silent Mitigations | 1:02:45 | 1 | |
|
2024-02-10 | christopher domas The movfuscator | 49:14 | 2 | |
|
2024-02-10 | colin o flynn Glitching and Side Channel Analysis for All | 27:56 | 1 | |
|
2024-02-10 | exide Finish Him | 40:24 | 1 | |
|
2024-02-10 | j00ru One font vulnerability to rule them all | 1:05:47 | 4 | |
|
2024-02-10 | jeffrey crowell julien voisin Radare2 building a new IDA | 25:28 | 2 | |
|
2024-02-10 | joan calvet marion marschalek paul rascagneres Totally Spies | 52:11 | 1 | |
|
2024-02-10 | mike ryan john mcmaster marshallh Reversing the Nintendo 64 CIC | 55:45 | 2 | |
|
2024-02-10 | nitay artenstein shift reduce Pandora s Cash Box The Ghost Under Your POS | 24:29 | 1 | |
|
2024-02-10 | peter hlavaty jihui lu This Time Font hunt you down in 4 bytes | 45:41 | 0 | |
|
2024-02-10 | sophia d antoine Exploiting Out of Order Execution | 23:28 | 1 | |
|
2024-02-10 | matt spisak Hardware Assisted Rootkits and Instrumentation ARM Edition | 57:38 | 5 | |
|
2024-02-10 | satoshi tanda Monitoring controlling kernel mode events by HyperPlatform | 28:10 | 0 | |
|