11:30 |
Running your own GSM network
Veranstaltungstyp lecture
Track Hacking
|
The Privacy Workshop Project
Enhancing the value of privacy in todays students view
Veranstaltungstyp lecture
Track Society
|
11:45 |
12:00 |
12:15 |
12:30 |
|
|
|
12:45 |
eVoting after Nedap and Digital Pen
Why cryptography might not fix the issue of transparent elections
Veranstaltungstyp lecture
Track Society
|
Repurposing the TI EZ430U
with msp430static, solder, and syringe
Veranstaltungstyp lecture
Track Making
|
Zehn Big Brother Awards in .at
Rückblick über eine bewegte Zeit
Veranstaltungstyp lecture
Track Society
|
13:00 |
13:15 |
13:30 |
13:45 |
|
|
|
14:00 |
Neusprech im Überwachungsstaat
Politikersprache zwischen Orwell und Online
Veranstaltungstyp lecture
Track Society
|
Privacy in the social semantic web
Social networks based on XMPP
Veranstaltungstyp lecture
Track Science
|
An introduction to new stream cipher designs
Turning data into line noise and back
Veranstaltungstyp lecture
Track Hacking
|
14:15 |
14:30 |
14:45 |
15:00 |
|
|
|
15:15 |
|
|
|
15:30 |
|
|
|
15:45 |
|
|
|
16:00 |
Analyzing RFID Security
Veranstaltungstyp lecture
Track Hacking
|
The Ultimate Commodore 64 Talk
Everything about the C64 in 64 Minutes
Veranstaltungstyp lecture
Track Hacking
|
Squeezing Attack Traces
How to get useable information out of your honeypot
Veranstaltungstyp lecture
Track Hacking
|
16:15 |
16:30 |
|
16:45 |
Stormfucker: Owning the Storm Botnet
Veranstaltungstyp lecture
Track Hacking
|
17:00 |
|
|
17:15 |
DECT
The Digital Enhanced Cordless Telecommunications standard
Veranstaltungstyp lecture
Track Hacking
|
Security and anonymity vulnerabilities in Tor
Past, present, and future
Veranstaltungstyp lecture
Track Hacking
|
17:30 |
17:45 |
18:00 |
18:15 |
|
|
|
18:30 |
Attacking NFC mobile phones
First look at the security of NFC mobile phones
Veranstaltungstyp lecture
Track Hacking
|
OnionCat – A Tor-based Anonymous VPN
Building an anonymous Internet within the Internet
Veranstaltungstyp lecture
Track Hacking
|
SWF and the Malware Tragedy
Hide and Seek in A. Flash
Veranstaltungstyp lecture
Track Hacking
|
18:45 |
19:00 |
19:15 |
19:30 |
|
|
|
19:45 |
|
|
|
20:00 |
|
|
|
20:15 |
|
|
|
20:30 |
Methods for Understanding Targeted Attacks with Office Documents
Veranstaltungstyp lecture
Track Hacking
|
Der elektronische Personalausweis
Endlich wird jeder zum "Trusted Citizen"
Veranstaltungstyp lecture
Track Society
|
20:45 |
21:00 |
21:15 |
21:30 |
|
|
|
21:45 |
Cisco IOS attack and defense
The State of the Art
Veranstaltungstyp lecture
Track Hacking
|
Objects as Software: The Coming Revolution
How RepRap and physical compilers will change the world as we know it (and already have)
Veranstaltungstyp lecture
Track Making
|
Weizenbaum
Rebel at work
Veranstaltungstyp movie
Track Culture
|
22:00 |
22:15 |
22:30 |
22:45 |
|
|
|
23:00 |
|
23:15 |
|
23:30 |
|
23:45 |
|
00:00 |
|
00:15 |
|
00:30 |
|
00:45 |
|