About Cyborgs and Gargoyles
State of the Art in Wearable Computing
Event type
: lecture
Track
: Science
Language used for presentation
: en
|
|
Advanced memory forensics: The Cold Boot Attacks
Recovering keys and other secrets after power off
Event type
: lecture
Track
: Hacking
Language used for presentation
: en
|
|
Algorithmic Music in a Box
Doing music with microcontrollers
Event type
: lecture
Track
: Making
Language used for presentation
: en
|
|
All your base(s) are belong to us
Dawn of the high-throughput DNA sequencing era
Event type
: lecture
Track
: Science
Language used for presentation
: en
|
|
Analyzing RFID Security
Event type
: lecture
Track
: Hacking
Language used for presentation
: en
|
|
Anatomy of smartphone hardware
Dissecting contemporary cellphone hardware
Event type
: lecture
Track
: Hacking
Language used for presentation
: en
|
|
An introduction to new stream cipher designs
Turning data into line noise and back
Event type
: lecture
Track
: Hacking
Language used for presentation
: en
|
|
Attacking NFC mobile phones
First look at the security of NFC mobile phones
Event type
: lecture
Track
: Hacking
Language used for presentation
: en
|
|
Attacking Rich Internet Applications
Not your mother's XSS bugs
Event type
: lecture
Track
: Hacking
Language used for presentation
: en
|
|
Banking Malware 101
Overview of Current Keylogger Threats
Event type
: lecture
Track
: Hacking
Language used for presentation
: en
|
|
Beyond Asimov - Laws for Robots
Developing rules for autonomous systems
Event type
: lecture
Track
: Society
Language used for presentation
: en
|
|
Blinkenlights Stereoscope
Behind the scenes of the new light installation
Event type
: lecture
Track
: Hacking
Language used for presentation
: en
|
|
Chip Reverse Engineering
Event type
: lecture
Track
: Hacking
Language used for presentation
: en
|
|
Cisco IOS attack and defense
The State of the Art
Event type
: lecture
Track
: Hacking
Language used for presentation
: en
|
|
Climate Change - State of the Science
Event type
: lecture
Track
: Science
Language used for presentation
: en
|
|
Collapsing the European security architecture
More security-critical behaviour in Europe!
Event type
: lecture
Track
: Society
Language used for presentation
: en
|
|
Console Hacking 2008: Wii Fail
Is implementation the enemy of design?
Event type
: lecture
Track
: Hacking
Language used for presentation
: en
|
|
coreboot: Beyond The Final Frontier
Open source BIOS replacement with a radical approach to boot.
Event type
: lecture
Track
: Hacking
Language used for presentation
: en
|
|
Cracking the MSP430 BSL
Part Two
Event type
: lecture
Track
: Hacking
Language used for presentation
: en
|
|
Crafting and Hacking: Separated at Birth
Event type
: lecture
Track
: Culture
Language used for presentation
: en
|
|
Das Grundrecht auf digitale Intimsphäre
Festplattenbeschlagnahme in neuem Licht
Event type
: lecture
Track
: Society
Language used for presentation
: de
|
|
Datenpannen
Forderungen nach dem Jahr der Datenverbrechen
Event type
: lecture
Track
: Society
Language used for presentation
: de
|
|
DECT
The Digital Enhanced Cordless Telecommunications standard
Event type
: lecture
Track
: Hacking
Language used for presentation
: en
|
|
Der elektronische Personalausweis
Endlich wird jeder zum "Trusted Citizen"
Event type
: lecture
Track
: Society
Language used for presentation
: de
|
|
Der Hackerparagraph 202c StGB
Bestandsaufnahme und Auswirkungen
Event type
: lecture
Track
: Hacking
Language used for presentation
: de
|
|
Embracing Post-Privacy
Optimism towards a future where there is "Nothing to hide"
Event type
: lecture
Track
: Society
Language used for presentation
: en
|
|
Erich Mühsams Tagebücher in der Festungshaft
Ein Idylle aus der Analogsteinzeit der Überwachung
Event type
: lecture
Track
: Society
Language used for presentation
: de
|
|
eVoting after Nedap and Digital Pen
Why cryptography might not fix the issue of transparent elections
Event type
: lecture
Track
: Society
Language used for presentation
: en
|
|
Exploiting Symbian
Symbian Exploit and Shellcode Development
Event type
: lecture
Track
: Hacking
Language used for presentation
: en
|
|
FAIFA: A first open source PLC tool
PowerLineCommunications has now their open source tool
Event type
: lecture
Track
: Hacking
Language used for presentation
: en
|
|
Flying for free
Exploiting the weather with unpowered aircraft
Event type
: lecture
Track
: Science
Language used for presentation
: en
|
|
Fnord News Show
Wir helfen Euch, die Fnords zu sehen
Event type
: lecture
Track
: Society
Language used for presentation
: de
|
|
Fnord News Show (English interpretation)
We help in seeing teh Fnords
Event type
: lecture
Track
: Society
Language used for presentation
: en
|
|
Full-Disk-Encryption Crash-Course
Everything to hide
Event type
: lecture
Track
: Hacking
Language used for presentation
: en
|
|
Hacking the iPhone
Pwning Apple's Mobile Internet Device
Event type
: lecture
Track
: Hacking
Language used for presentation
: en
|
|
Handschellen hacken
Essentielles Grundwissen für alle, die nichts zu verbergen hatten
Event type
: lecture
Track
: Hacking
Language used for presentation
: de
|
|
Just Estonia and Georgia?
Global-scale Incident Response and Responders
Event type
: lecture
Track
: Culture
Language used for presentation
: en
|
|
Kurt Gödel – I do not fit into this century
Ein audiovisuelles Live-Feature
Event type
: lecture
Track
: Culture
Language used for presentation
: de
|
|
La Quadrature du Net - Campaigning on Telecoms Package
Pan-european activism for patching a "pirated" law
Event type
: lecture
Track
: Society
Language used for presentation
: en
|
|
Life is a Holodeck!
An overview of holographic techniques
Event type
: lecture
Track
: Science
Language used for presentation
: en
|
|
Locating Mobile Phones using SS7
Event type
: lecture
Track
: Hacking
Language used for presentation
: en
|
|
MD5 considered harmful today
Creating a rogue CA Certificate
Event type
: lecture
Track
: Hacking
Language used for presentation
: en
|
|
Messing Around with Garage Doors
Breaking Remote Keyless Entry Systems with Power Analysis
Event type
: lecture
Track
: Hacking
Language used for presentation
: en
|
|
Methods for Understanding Targeted Attacks with Office Documents
Event type
: lecture
Track
: Hacking
Language used for presentation
: en
|
|
Mining social contacts with active RFID
Event type
: lecture
Track
: Hacking
Language used for presentation
: en
|
|
Neusprech im Überwachungsstaat
Politikersprache zwischen Orwell und Online
Event type
: lecture
Track
: Society
Language used for presentation
: de
|
|
Not Soy Fast: Genetically Modified, Resource Greedy, and coming to a Supermarket Near You
The silent march of the multinational GMO soy industry and its growing power in South America, the EU, and around the World.
Event type
: lecture
Track
: Society
Language used for presentation
: en
|
|
Objects as Software: The Coming Revolution
How RepRap and physical compilers will change the world as we know it (and already have)
Event type
: lecture
Track
: Making
Language used for presentation
: en
|
|
OnionCat – A Tor-based Anonymous VPN
Building an anonymous Internet within the Internet
Event type
: lecture
Track
: Hacking
Language used for presentation
: en
|
|
Pflanzenhacken
Züchten 2.0
Event type
: lecture
Track
: Making
Language used for presentation
: de
|
|
Predictable RNG in the vulnerable Debian OpenSSL package
the What and the How
Event type
: lecture
Track
: Hacking
Language used for presentation
: en
|
|
Privacy in the social semantic web
Social networks based on XMPP
Event type
: lecture
Track
: Science
Language used for presentation
: en
|
|
Rapid Prototype Your Life
The time is now to make anything you can imagine
Event type
: lecture
Track
: Making
Language used for presentation
: en
|
|
Repurposing the TI EZ430U
with msp430static, solder, and syringe
Event type
: lecture
Track
: Making
Language used for presentation
: en
|
|
RF fingerprinting of RFID
Event type
: lecture
Track
: Hacking
Language used for presentation
: en
|
|
Running your own GSM network
Event type
: lecture
Track
: Hacking
Language used for presentation
: en
|
|
Scalable Swarm Robotics
Formica: a cheap, open research platform
Event type
: lecture
Track
: Making
Language used for presentation
: en
|
|
Security and anonymity vulnerabilities in Tor
Past, present, and future
Event type
: lecture
Track
: Hacking
Language used for presentation
: en
|
|
Security Failures in Smart Card Payment Systems
Tampering the Tamper-Proof
Event type
: lecture
Track
: Hacking
Language used for presentation
: en
|
|
Security Nightmares 2009
Oder: worüber wir nächstes Jahr lachen werden
Event type
: lecture
Track
: Hacking
Language used for presentation
: de
|
|
Security Nightmares 2009 (English interpretation)
Or: about what we will laugh next year
Event type
: lecture
Track
: Hacking
Language used for presentation
: en
|
|
Security of MICA*-based wireless sensor networks
Event type
: lecture
Track
: Hacking
Language used for presentation
: en
|
|
Short Attention Span Security
A little of everything
Event type
: lecture
Track
: Hacking
Language used for presentation
: en
|
|
Solar-powering your Geek Gear
Alternative and mobile power for all your little toys
Event type
: lecture
Track
: Making
Language used for presentation
: en
|
|
Soviet Unterzoegersdorf
A Nation In Transit
Event type
: lecture
Track
: Culture
Language used for presentation
: en
|
|
Squeezing Attack Traces
How to get useable information out of your honeypot
Event type
: lecture
Track
: Hacking
Language used for presentation
: en
|
|
Stormfucker: Owning the Storm Botnet
Event type
: lecture
Track
: Hacking
Language used for presentation
: en
|
|
SWF and the Malware Tragedy
Hide and Seek in A. Flash
Event type
: lecture
Track
: Hacking
Language used for presentation
: en
|
|
TCP Denial of Service Vulnerabilities
Accepting the Partial Disclosure Challenge
Event type
: lecture
Track
: Hacking
Language used for presentation
: en
|
|
Terrorist All-Stars
Some cases of terrorism around the world that are not terrorist at all
Event type
: lecture
Track
: Society
Language used for presentation
: en
|
|
The Infinite Library
Storage and Access of Pornographic Information
Event type
: lecture
Track
: Society
Language used for presentation
: en
|
|
The Privacy Workshop Project
Enhancing the value of privacy in todays students view
Event type
: lecture
Track
: Society
Language used for presentation
: en
|
|
The Trust Situation
Why the idea of data protection slowly turns out to be defective
Event type
: lecture
Track
: Society
Language used for presentation
: en
|
|
The Ultimate Commodore 64 Talk
Everything about the C64 in 64 Minutes
Event type
: lecture
Track
: Hacking
Language used for presentation
: en
|
|
Tricks: makes you smile
A clever or ingenious device or expedient; adroit technique: the tricks of the trade.
Event type
: lecture
Track
: Hacking
Language used for presentation
: en
|
|
Vertex Hacking
Reverse Engineering von 3D-Dateiformaten
Event type
: lecture
Track
: Hacking
Language used for presentation
: de
|
|
Vulnerability discovery in encrypted closed source PHP applications
Event type
: lecture
Track
: Hacking
Language used for presentation
: en
|
|
Weizenbaum
Rebel at work
Event type
: movie
Track
: Culture
Language used for presentation
: de
|
|
Why were we so vulnerable to the DNS vulnerability?
Event type
: lecture
Track
: Hacking
Language used for presentation
: en
|
|
Wikileaks
Wikileaks vs. the World
Event type
: lecture
Track
: Society
Language used for presentation
: en
|
|
Zehn Big Brother Awards in .at
Rückblick über eine bewegte Zeit
Event type
: lecture
Track
: Society
Language used for presentation
: de
|
|