| 11:00 |
|
|
|
Deutschlandfunk @ 29C3
Interviews, Talkrunden, Kennenlernen
|
| 11:15 |
|
|
|
| 11:30 |
CCC-Jahresrückblick
|
Securing the Campaign
Security and the 2012 US Presidential Election
|
CVE-2011-3402 Technical Analysis
|
| 11:45 |
| 12:00 |
| 12:15 |
| 12:30 |
|
|
| 12:45 |
Lightning Talks 2
5 Minutes of Fame
|
Stabilitätsanker & Wachstumslokomotive
|
| 13:00 |
| 13:15 |
Ethics in Security Research
|
| 13:30 |
| 13:45 |
|
|
| 14:00 |
Analytical Summary of the BlackHole Exploit Kit
Almost Everything You Ever Wanted To Know About The BlackHole Exploit Kit
|
On Breaking SAML
Be Whoever You Want to Be
|
| 14:15 |
| 14:30 |
Small footprint inspection techniques for Android
Reverse engineering on Android platforms
|
| 14:45 |
| 15:00 |
|
|
|
| 15:15 |
|
|
|
| 15:30 |
|
|
|
| 15:45 |
|
|
|
| 16:00 |
Open Source Schlüssel und Schlösser
Offene Quellen zum Bösen und Guten: von downloadbaren Handschellenschlüsseln zu sicheren elektronischen Schlössern
|
Privatisierung der Rechtsdurchsetzung
Von ACTA, IPRED und Freunden
|
An Overview of Secure Name Resolution
DNSSEC, DNSCurve and Namecoin
|
| 16:15 |
Live-Sendung »Computer und Kommunikation«
Deutschlandfunk @ 29C3
|
| 16:30 |
| 16:45 |
| 17:00 |
|
|
|
Deutschlandfunk @ 29C3
Interviews, Talkrunden, Kennenlernen
|
| 17:15 |
Writing a Thumbdrive from Scratch
Prototyping Active Disk Antiforensics
|
Sind faire Computer möglich?
|
Long live the protocoletariat!
|
| 17:30 |
| 17:45 |
| 18:00 |
|
| 18:15 |
|
|
|
|
| 18:30 |
Russia’s Surveillance State
|
Low-Cost Chip Microprobing
|
Hacking Philosophy
Digitale Mündigkeit, Technikpaternalismus und warum wir Netzphilosophie brauchen
|
|
| 18:45 |
|
| 19:00 |
|
| 19:15 |
|
| 19:30 |
|
|
|
|
| 19:45 |
|
|
|
|
| 20:00 |
|
|
|
|
| 20:15 |
|
|
|
|
| 20:30 |
Milking the Digital Cash Cow
Extracting Secret Keys of Contactless Smartcards
|
Security Evaluation of Russian GOST Cipher
Survey of All Known Attacks on Russian Government Encryption Standard
|
A Rambling Walk Through an EMV Transaction
|
|
| 20:45 |
|
| 21:00 |
|
| 21:15 |
|
| 21:30 |
|
|
|
|
| 21:45 |
Further hacks on the Calypso platform
or how to turn a phone into a BTS
|
Hash-flooding DoS reloaded: attacks and defenses
|
Men who stare at bits
RFID-Studierendenkarten mit Fehlern
|
|
| 22:00 |
|
| 22:15 |
|
| 22:30 |
|
| 22:45 |
|
|
|
|
| 23:00 |
Fnord-Jahresrückblick
Diesmal mit noch mehr Eurozonen-Spaltung!
|
Pflanzenhacken richtig
Einblicke in die Weizenzüchtung
|
The future of protocol reversing and simulation applied on ZeroAccess botnet
Mapping your enemy Botnet with Netzob
|
|
| 23:15 |
|
| 23:30 |
|
| 23:45 |
|