This talk by Stefan Widmann gives an introduction to firmware analysis: It starts with how to retrieve the binary, e.g.
The aim of this talk by Clemens Hopfer from the 30th Chaos Communication Congress is to give an understandable insight into wireless communication, using existing systems as examples on why there are different communication systems for different uses.
Symbolic Execution (SE) is a powerful way to analyze programs.
Security researchers Andrew “bunnie” Huang and Sean “xobs” Cross have demonstrated that the only way to be absolutely sure that no one will be able to extract data from a SD memory card you used is to physically destroy it.
Password-based authentication is widely used today, despite problems with security and usability.