28C3 - Version 2.3.5
28th Chaos Communication Congress
Behind Enemy Lines
Schedule Day 3
| Saal 1 | Saal 2 | Saal 3 | |
|---|---|---|---|
| Saal 1 | Saal 2 | Saal 3 | |
| 11:30 | |||
| 11:45 | |||
| 12:00 | |||
| 12:15 | |||
| 12:30 | |||
| 12:45 | |||
| 13:00 | |||
| 13:15 | |||
| 13:30 | |||
| 13:45 | |||
| 14:00 | |||
| 14:15 | |||
| 14:30 | |||
| 14:45 | |||
| 15:00 | |||
| 15:15 |
Real-time 3D Reconstruction and Interaction Using a Moving Depth Camera |
||
| 15:30 | |||
| 15:45 | |||
| 16:00 |
Deceiving Authorship Detection Tools to Maintain Anonymity Through Writing Style & Current Trends in Adversarial Stylometry |
||
| 16:15 | |||
| 16:30 | |||
| 16:45 | |||
| 17:00 | |||
| 17:15 | |||
| 17:30 | |||
| 17:45 | |||
| 18:00 | |||
| 18:15 | |||
| 18:30 |
Implementation of MITM Attack on HDCP-Secured Links A non-copyright circumventing application of the HDCP master key |
Firmware Modification Attacks and the Rise of Printer Malware |
|
| 18:45 | |||
| 19:00 | |||
| 19:15 | |||
| 19:30 | |||
| 19:45 | |||
| 20:00 | |||
| 20:15 | |||
| 20:30 |
The future of cryptology: which 3 letters algorithm(s) could be our Titanic? |
||
| 20:45 | |||
| 21:00 | |||
| 21:15 | |||
| 21:30 | |||
| 21:45 | |||
| 22:00 | |||
| 22:15 | |||
| 22:30 | |||
| 22:45 | |||
| 23:00 |
CCC Camp 2011 Video Impressions |
||
| 23:15 | |||
| 23:30 | |||
| 23:45 | |||
| 00:00 | |||
| 00:15 | |||
| 00:30 | |||
| 00:45 | |||
| 01:00 | |||
| 01:15 | |||
| 01:30 |