11:30 |
Politik hacken
Kleine Anleitung zur Nutzung von Sicherheitslücken gesellschaftlicher und politischer Kommunikation
|
Eating in the Anthropocene
Transgenic Fish, Mutagenic Grapefruits and Space Potatoes
|
|
11:45 |
|
12:00 |
|
12:15 |
|
12:30 |
|
|
|
12:45 |
Echtes Netz
Kampagne für Netzneutralität
|
Data Mining the Israeli Census
Insights into a publicly available registry
|
13:00 |
13:15 |
Don't scan, just ask
A new approach of identifying vulnerable web applications
|
13:30 |
13:45 |
|
|
14:00 |
Effective Denial of Service attacks against web application platforms
We are the 99% (CPU usage)
|
Reverse Engineering USB Devices
|
14:15 |
14:30 |
A Brief History of Plutocracy
|
14:45 |
15:00 |
|
|
|
15:15 |
|
|
|
15:30 |
|
|
|
15:45 |
|
|
|
16:00 |
The Science of Insecurity
|
Power gadgets with your own electricity
escape the basement and make the sun work for you
|
Privacy Invasion or Innovative Science?
Academia, social media data, and privacy
|
16:15 |
16:30 |
16:45 |
17:00 |
|
|
|
17:15 |
Hacking MFPs
Part2 - PostScript: Um, you've been hacked
|
Bionic Ears
Introduction into State-of-the-Art Hearing Aid Technology
|
Counterlobbying EU institutions
How to attempt to counter the influence of industry lobbyists and political forces aiming towards increasing control over the Internet
|
17:30 |
17:45 |
18:00 |
18:15 |
|
|
|
18:30 |
How governments have tried to block Tor
|
Time is on my Side
Exploiting Timing Side Channel Vulnerabilities on the Web
|
Ein Mittelsmannangriff auf ein digitales Signiergerät
Bachelorarbeit Informatik Uni Kiel SS 2011
|
18:45 |
19:00 |
19:15 |
19:30 |
|
|
|
19:45 |
|
|
|
20:00 |
|
|
|
20:15 |
|
|
|
20:30 |
„Die Koalition setzt sich aber aktiv und ernsthaft dafür ein“
Sprachlicher Nebel in der Politik
|
Rootkits in your Web application
Achieving a permanent stealthy compromise of user accounts with XSS and JS injection attacks.
|
Reverse-engineering a Qualcomm baseband
|
20:45 |
21:00 |
21:15 |
21:30 |
|
|
|
21:45 |
Apple vs. Google Client Platforms
How you end up being the Victim.
|
Building a Distributed Satellite Ground Station Network - A Call To Arms
Hackers need satellites. Hackers need internet over satellites. Satellites require ground stations. Let's build them!
|
Post Memory Corruption Memory Analysis
Automating exploitation of invalid memory writes
|
22:00 |
22:15 |
22:30 |
22:45 |
|
|
|
23:00 |
Quantified-Self and OpenBCI Neurofeedback Mind-Hacking
Transhumanism, Self-Optimization and Neurofeedback for post-modern hackers
|
Crowdsourcing Genome Wide Association Studies
Freeing Genetic Data from Corporate Vaults
|
23:15 |
23:30 |
23:45 |
00:00 |
|
|
|
00:15 |
Hacker Jeopardy
Number guessing for geeks
|
NPC - Nerds’ Pissing Contest
Mein Ruby ist besser als dein urxvt!
|
Hacker Jeopardy Translation
|
00:30 |
00:45 |
01:00 |
01:15 |
|
01:30 |
|
01:45 |
|
02:00 |
|
|