| 11:30 |
Politik hacken
Kleine Anleitung zur Nutzung von Sicherheitslücken gesellschaftlicher und politischer Kommunikation
|
Eating in the Anthropocene
Transgenic Fish, Mutagenic Grapefruits and Space Potatoes
|
|
| 11:45 |
|
| 12:00 |
|
| 12:15 |
|
| 12:30 |
|
|
|
| 12:45 |
Echtes Netz
Kampagne für Netzneutralität
|
Data Mining the Israeli Census
Insights into a publicly available registry
|
| 13:00 |
| 13:15 |
Don't scan, just ask
A new approach of identifying vulnerable web applications
|
| 13:30 |
| 13:45 |
|
|
| 14:00 |
Effective Denial of Service attacks against web application platforms
We are the 99% (CPU usage)
|
Reverse Engineering USB Devices
|
| 14:15 |
| 14:30 |
A Brief History of Plutocracy
|
| 14:45 |
| 15:00 |
|
|
|
| 15:15 |
|
|
|
| 15:30 |
|
|
|
| 15:45 |
|
|
|
| 16:00 |
The Science of Insecurity
|
Power gadgets with your own electricity
escape the basement and make the sun work for you
|
Privacy Invasion or Innovative Science?
Academia, social media data, and privacy
|
| 16:15 |
| 16:30 |
| 16:45 |
| 17:00 |
|
|
|
| 17:15 |
Hacking MFPs
Part2 - PostScript: Um, you've been hacked
|
Bionic Ears
Introduction into State-of-the-Art Hearing Aid Technology
|
Counterlobbying EU institutions
How to attempt to counter the influence of industry lobbyists and political forces aiming towards increasing control over the Internet
|
| 17:30 |
| 17:45 |
| 18:00 |
| 18:15 |
|
|
|
| 18:30 |
How governments have tried to block Tor
|
Time is on my Side
Exploiting Timing Side Channel Vulnerabilities on the Web
|
Ein Mittelsmannangriff auf ein digitales Signiergerät
Bachelorarbeit Informatik Uni Kiel SS 2011
|
| 18:45 |
| 19:00 |
| 19:15 |
| 19:30 |
|
|
|
| 19:45 |
|
|
|
| 20:00 |
|
|
|
| 20:15 |
|
|
|
| 20:30 |
„Die Koalition setzt sich aber aktiv und ernsthaft dafür ein“
Sprachlicher Nebel in der Politik
|
Rootkits in your Web application
Achieving a permanent stealthy compromise of user accounts with XSS and JS injection attacks.
|
Reverse-engineering a Qualcomm baseband
|
| 20:45 |
| 21:00 |
| 21:15 |
| 21:30 |
|
|
|
| 21:45 |
Apple vs. Google Client Platforms
How you end up being the Victim.
|
Building a Distributed Satellite Ground Station Network - A Call To Arms
Hackers need satellites. Hackers need internet over satellites. Satellites require ground stations. Let's build them!
|
Post Memory Corruption Memory Analysis
Automating exploitation of invalid memory writes
|
| 22:00 |
| 22:15 |
| 22:30 |
| 22:45 |
|
|
|
| 23:00 |
Quantified-Self and OpenBCI Neurofeedback Mind-Hacking
Transhumanism, Self-Optimization and Neurofeedback for post-modern hackers
|
Crowdsourcing Genome Wide Association Studies
Freeing Genetic Data from Corporate Vaults
|
| 23:15 |
| 23:30 |
| 23:45 |
| 00:00 |
|
|
|
| 00:15 |
Hacker Jeopardy
Number guessing for geeks
|
NPC - Nerds’ Pissing Contest
Mein Ruby ist besser als dein urxvt!
|
Hacker Jeopardy Translation
|
| 00:30 |
| 00:45 |
| 01:00 |
| 01:15 |
|
| 01:30 |
|
| 01:45 |
|
| 02:00 |
|
|