Honey, I Shrunk the Attack Surface – Adventures in Android Security Hardening
49:51
Betraying the BIOS: Where the Guardians of the BIOS are Failing
44:06
3G/4G Intranet Scanning and its Application on the WormHole Vulnerability
17:34
Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)
44:59
Cloak & Dagger: From Two Permissions to Complete Control of the UI Feedback Loop
47:49
Securing the System: A Deep Dive into Reversing Android Pre-Installed Apps
18:06
What is a Browser Security Sandbox?! (Learn to Hack Firefox)
9:27
Artificial Intelligence: The new attack surface
37:23