28C3 - Version 2.3.5
28th Chaos Communication Congress
Behind Enemy Lines
Programm Day 3
Saal 1 | Saal 2 | Saal 3 | |
---|---|---|---|
Saal 1 | Saal 2 | Saal 3 | |
11:30 | |||
11:45 | |||
12:00 | |||
12:15 | |||
12:30 | |||
12:45 | |||
13:00 | |||
13:15 | |||
13:30 | |||
13:45 | |||
14:00 | |||
14:15 | |||
14:30 | |||
14:45 | |||
15:00 | |||
15:15 |
Real-time 3D Reconstruction and Interaction Using a Moving Depth Camera |
||
15:30 | |||
15:45 | |||
16:00 |
Deceiving Authorship Detection Tools to Maintain Anonymity Through Writing Style & Current Trends in Adversarial Stylometry |
||
16:15 | |||
16:30 | |||
16:45 | |||
17:00 | |||
17:15 | |||
17:30 | |||
17:45 | |||
18:00 | |||
18:15 | |||
18:30 |
Implementation of MITM Attack on HDCP-Secured Links A non-copyright circumventing application of the HDCP master key |
Firmware Modification Attacks and the Rise of Printer Malware |
|
18:45 | |||
19:00 | |||
19:15 | |||
19:30 | |||
19:45 | |||
20:00 | |||
20:15 | |||
20:30 |
The future of cryptology: which 3 letters algorithm(s) could be our Titanic? |
||
20:45 | |||
21:00 | |||
21:15 | |||
21:30 | |||
21:45 | |||
22:00 | |||
22:15 | |||
22:30 | |||
22:45 | |||
23:00 |
CCC Camp 2011 Video Impressions |
||
23:15 | |||
23:30 | |||
23:45 | |||
00:00 | |||
00:15 | |||
00:30 | |||
00:45 | |||
01:00 | |||
01:15 | |||
01:30 |