Version Mildenberg
Events
Science
Title | Track | Speakers | |
---|---|---|---|
0en & 1en auf dem Acker
Die Dynamik der globalen Agrarmärkte hat sich in den letzten Jahren verstärkt... |
Science | ||
A hacker's guide to Climate Change - What do we know and how do we know it?
Climate change has long ceased to be news to many people, but it is... |
Science | ||
Algorithmic science evaluation and power structure: the discourse on strategic citation and 'citation cartels'
Quantitative science evaluation, such as university rankings, rely on... |
Science | ||
Beeinflussung durch Künstliche Intelligenz
Eine wissenschaftliche Perspektive auf die achtlose Anwendung der Algorithmen... |
Science | ||
Closing the loop: Reconnecting social-technologial dynamics to Earth System science
International commitment to the appropriately ambitious Paris climate... |
Science | ||
Don't stop 'til you feel it
This talk will report on my current research in bringing to bear multiple... |
Science | ||
Drones of Power: Airborne Wind Energy
Airborne wind energy is the attempt to bring the digital revolution to the... |
Science | ||
Ensuring Climate Data Remains Public
How do we keep important environmental and climate data accessible amidst... |
Science | ||
Es sind die kleinen Dinge im Leben II
Jeder weiß ungefähr was man mit einem Mikroskop tun kann: Kleine Dinge... |
Science | ||
Extended DNA Analysis
In 2017, the federal states of Baden-Wurttemberg and Bavaria suggested the... |
Science | ||
Free Electron Lasers
Wouldn’t it be awesome to have a microscope which allows scientists to map... |
Science | ||
Holography of Wi-Fi radiation
Holography of Wi-Fi radiation Philipp Holl [1,2] and Friedemann Reinhard... |
Science | ||
International Image Interoperability Framework (IIIF) – Kulturinstitutionen schaffen interoperable Schnittstellen für digitalisiertes Kulturgut
Neue Standards wie IIIF (http://iiif.io) ermöglichen es, digitalisiertes... |
Science | ||
On the Prospects and Challenges of Weather and Climate Modeling at Convection-Resolving Resolution
The representation of thunderstorms (deep convection) and rain showers in... |
Science | ||
Relativitätstheorie für blutige Anfänger
Jeder kennt sie, kaum jemand versteht sie wirklich, die vielleicht... |
Science | ||
SatNOGS: Crowd-sourced satellite operations
An overview of the SatNOGS project, a network of satellite ground station... |
Science | ||
Saving the World with Space Solar Power
Space Solar Power station, such as SPS Alpha, could overcome some issues that... |
Science | ||
Science is broken
We're supposed to trust evidence-based information in all areas of life.... |
Science | ||
Simulating the future of the global agro-food system
How can we feed a growing world population within a resilient Earth System?... |
Science | ||
Treibhausgasemissionen einschätzen
Alles was wir jeden Tag tun erzeugt Treibhausgase. Für eine... |
Science | ||
UPSat - the first open source satellite
During 2016 Libre Space Foundation a non-profit organization developing open... |
Science | ||
Watching the changing Earth
For a few decades by now, satellites offer us the tools to observe the whole... |
Science | ||
WHWP
Vorstellung der Dissertation "WHWP - Walter Höllerer bei WikiPedia". Es wurde... |
Science |
Security
Title | Track | Speakers | |
---|---|---|---|
1-day exploit development for Cisco IOS
Year 2017 was rich in vulnerabilities discovered for Cisco networking... |
Security | ||
Are all BSDs created equally?
In this presentation I start off asking the question „How come there are only... |
Security | ||
ASLR on the line
Address Space Layout Randomization (ASLR) is fundamentally broken on modern... |
Security | ||
avatar²
Avatar² is an open source framework for dynamic instrumentation and analysis... |
Security | ||
BootStomp: On the Security of Bootloaders in Mobile Devices
In our paper we present a novel tool called BootStomp able to identify... |
Security | ||
Console Security - Switch
Nintendo has a new console, and it's more secure than ever. |
Security | ||
Decoding Contactless (Card) Payments
This talk will dive into the techniques and protocols that drive contactless... |
Security | ||
Defeating (Not)Petya's Cryptography
In this presentation we will outline our findings about (Not)Petya's crypto... |
Security | ||
Die fabelhafte Welt des Mobilebankings
Bisher wurden Angriffe gegen App-basierte TAN-Verfahren und Mobilebanking von... |
Security | ||
Doping your Fitbit
Security architectures for wearables are challenging. We take a deeper look... |
Security | ||
DPRK Consumer Technology
The DPRK has largely succeeded at hiding its consumer technology. While... |
Security | ||
Electromagnetic Threats for Information Security
For non specialists, Electromagnetic Pulse weapons (EMP) are fantasy weapons... |
Security | ||
eMMC hacking, or: how I fixed long-dead Galaxy S3 phones
How I hacked Sasmung eMMC chips: from an indication that they have a firmware... |
Security | ||
Everything you want to know about x86 microcode, but might have been afraid to ask
Microcode is an abstraction layer on top of the physical components of a CPU... |
Security | ||
How to drift with any car
Lots of research are arising from the fairly unexplored world of automative... |
Security | ||
Implementing an LLVM based Dynamic Binary Instrumentation framework
This talk will go over our efforts to implement a new open source DBI... |
Security | ||
Inside Android’s SafetyNet Attestation: Attack and Defense
SafetyNet Attestation is the primary platform security service on Android.... |
Security | ||
Inside Intel Management Engine
Positive Technologies researchers Maxim Goryachy and Mark Ermolov have... |
Security | ||
Intel ME: Myths and reality
Many claims were made recently about purpose and capabilities of the Intel ME... |
Security | ||
iOS kernel exploitation archaeology
This talk presents the technical details and the process of reverse... |
Security | ||
KRACKing WPA2 by Forcing Nonce Reuse
We introduce key reinstallation attacks (KRACKs). These attacks abuse... |
Security | ||
Ladeinfrastruktur für Elektroautos: Ausbau statt Sicherheit
Wir retten das Klima mit Elektroautos — und bauen die Ladeinfrastruktur... |
Security | ||
LatticeHacks
Lattices are an extremely useful mathematical tool for cryptography. This... |
Security | ||
Lets break modern binary code obfuscation
Do you want to learn how modern binary code obfuscation and deobfuscation... |
Security | ||
Microarchitectural Attacks on Trusted Execution Environments
Trusted Execution Environments (TEEs), like those based on ARM TrustZone or... |
Security | ||
Mobile Data Interception from the Interconnection Link
Many mobile network operators rush to upgrade their networks to 4G/LTE from... |
Security | ||
MQA - A clever stealth DRM-Trojan
Master Quality Authenticated (MQA) is a new audio format promising studio... |
Security | ||
Resilienced Kryptographie
Die Sicherheitsdesaster bei der Schlüsselgenerierung in TPM Chips und bei der... |
Security | ||
SCADA - Gateway to (s)hell
Small gateways connect all kinds of fieldbusses to IP systems. This talk will... |
Security | ||
Squeezing a key through a carry bit
The Go implementation of the P-256 elliptic curve had a small bug due to a... |
Security | ||
Taking a scalpel to QNX
In this talk we will present a deep-dive analysis of the anatomy of QNX: a... |
Security | ||
The Noise Protocol Framework
The <a href="https://noiseprotocol.org">Noise Protocol Framework</a> is a... |
Security | ||
TrustZone is not enough
This talk deals with embedded systems security and ARM processors... |
Security | ||
Type confusion: discovery, abuse, and protection
Type confusion, often combined with use-after-free, is the main attack vector... |
Security | ||
Uncovering vulnerabilities in Hoermann BiSecur
Hoermann BiSecur is a bi-directional wireless access control system “for the... |
Security | ||
We should share our secrets
Backing up private keys in a secure manner is not straightforward. Once a... |
Security |
CCC
Title | Track | Speakers | |
---|---|---|---|
34C3 Infrastructure Review
In this traditional lecture, various teams provide an inside look at how this... |
CCC | ||
Abschluss
DE: Damit wir als Komputerfrieks nicht länger unkoordiniert vor uns... |
CCC | ||
All Creatures Welcome
ALL CREATURES WELCOME is a documentary film about the communities of the... |
CCC | ||
Bildung auf dem Weg ins Neuland
An unseren Schulen besteht ein großes Defizit hinsichtlich der Vermittlung... |
CCC | ||
Der PC-Wahl-Hack
Hacker des Chaos Computer Clubs (CCC) haben eine in mehreren Bundesländern... |
CCC | ||
Eröffnung: tuwat
Daß sich mit Kleinkomputern trotzalledem sinnvolle Sachen machen lassen, die... |
CCC | ||
Jahresrückblick des CCC 2017
Staatstrojaner, Vorratsdaten, automatisierte Biometriesammlungen, PC-Wahl –... |
CCC | ||
Lightning Talks Day 2
Lightning Talks are short lectures (almost) any congress participant may... |
CCC | ||
Lightning Talks Day 3
Lightning Talks are short lectures (almost) any congress participant may... |
CCC | ||
Lightning Talks Day 4
Lightning Talks are short lectures (almost) any congress participant may... |
CCC | ||
Security Nightmares 0x12
Was hat sich im letzten Jahr im Bereich IT-Sicherheit getan? Welche neuen... |
CCC |
Art & Culture
Title | Track | Speakers | |
---|---|---|---|
Access To Bodies
Cyborgs und Body Enhancement sind typisch männlich dominierte Thematiken... |
Art & Culture | ||
Afro TECH
Inke Arns will present speculative projections of the future and current... |
Art & Culture | ||
BBSs and early Internet access in the 1990ies
This talk explains how individuals were able to communicate globally in the... |
Art & Culture | ||
Deconstructing a Socialist Lawnmower
Darsha Hewitt is a Canadian artist working in new media and sound. She is... |
Art & Culture | ||
Dude, you broke the Future!
We're living in yesterday's future, and it's nothing like the speculations of... |
Art & Culture | ||
Ecstasy 10x yellow Twitter 120mg Mdma
Artists !Mediengruppe Bitnik talk about recent works around bots and the... |
Art & Culture | ||
Forensic Architecture
In recent years, the group Forensic Architecture began using novel research... |
Art & Culture | ||
Humans as software extensions
While technology is often described as an extension of our bodies, this talk... |
Art & Culture | ||
institutions for Resolution Disputes
The institutions of Resolution Disputes [iRD] call attention to media... |
Art & Culture | ||
Open Source Estrogen
Collaborative and interdisciplinary research, Open Source Estrogen combines... |
Art & Culture | ||
Robot Music
Once full automation hits, we will have a lot of free time on our hands. This... |
Art & Culture | ||
The Work of Art in the Age of Digital Assassination
My talk explores the interconnected nature of war and culture. It does so... |
Art & Culture | ||
Tracking Transience
Hasan Elahi is an interdisciplinary artist working with issues in... |
Art & Culture | ||
Visceral Systems
This talk considers the visceral relationship one can have towards intangible... |
Art & Culture | ||
Why Do We Anthropomorphize Computers?...
A talk on waiting for the technological rapture in the church of big data.... |
Art & Culture |
Ethics, Society & Politics
Title | Track | Speakers | |
---|---|---|---|
All Computers Are Beschlagnahmt
Im August 2017 wurde Indymedia linksunten vom Bundesinnenminister verboten.... |
Ethics, Society & Politics | ||
Antipatterns und Missverständnisse in der Softwareentwicklung
Anhand von Anekdoten aus 20 Jahren Softwareentwicklung versucht der Vortrag... |
Ethics, Society & Politics | ||
BGP and the Rule of Custom
When bad actors can simply move servers from country to country, why does the... |
Ethics, Society & Politics | ||
Catch me if you can: Internet Activism in Saudi Arabia
Activists in Saudi Arabia have been able to celebrate important victories... |
Ethics, Society & Politics | ||
cryptocurrencies, smart contracts, etc.: revolutionary tech?
Bitcoin arrived eight years ago, and has now spawned a dazzling array of... |
Ethics, Society & Politics | ||
Der netzpolitische Wetterbericht
Deutschland hat gewählt, man weiß nur noch nicht, wer regieren wird. Bis... |
Ethics, Society & Politics | ||
Die göttliche Informatik / The divine Computer Science
Die Informatik ist scheinbar das neue Göttliche, das den Klimawandel, die... |
Ethics, Society & Politics | ||
Die Lauschprogramme der Geheimdienste
Der NSA-BND-Untersuchungsausschuss des Deutschen Bundestags ist zu Ende. Da... |
Ethics, Society & Politics | ||
Die Sprache der Überwacher
So intensiv wie 2017 wurde der Themenkomplex rund um Sicherheit und... |
Ethics, Society & Politics | ||
Financial surveillance
Faced with new responsibilities to prevent terrorism and money laundering,... |
Ethics, Society & Politics | ||
Fuck Dutch mass-surveillance: let's have a referendum!
Dutch intelligence agencies will soon be allowed to analyse bulk data of... |
Ethics, Society & Politics | ||
Gamified Control?
In 2014 China’s government announced the implementation of big data based... |
Ethics, Society & Politics | ||
History and implications of DRM
Digital Restrictions Management (DRM) is found everywhere from music to cars... |
Ethics, Society & Politics | ||
How risky is the software you use?
Software vendors like to claim that their software is secure, but the effort... |
Ethics, Society & Politics | ||
Internet censorship in the Catalan referendum
On October 1st the Catalan society held a referendum to decide if they wanted... |
Ethics, Society & Politics | ||
Internet of Fails
Expect current examples of IoT fails that I collected during my work as a... |
Ethics, Society & Politics | ||
Italy's surveillance toolbox
This project aims to take advantage of the availability of public procurement... |
Ethics, Society & Politics | ||
Lobby-Schlacht um die ePrivacy-Verordnung
In der EU wird gerade über eine Verordnung verhandelt, die für die... |
Ethics, Society & Politics | ||
Net Neutraliy Enforcement in the EU
After four years of advocacy and lobbying to enshrine net neutrality... |
Ethics, Society & Politics | ||
Netzpolitik in der Schweiz
Gleich in drei Gesetzen drohen Netzsperren. Staatstrojaner und... |
Ethics, Society & Politics | ||
Pointing Fingers at 'The Media'
The German election in September 2017 brought a tectonic shift to the layout... |
Ethics, Society & Politics | ||
Policing in the age of data exploitation
What does policing look like in the age of data exploitation? This is the... |
Ethics, Society & Politics | ||
Privacy Shield - Lipstick on a Pig?
In 2015 the Court of Justice of the European Union (CJEU) has overturned the... |
Ethics, Society & Politics | ||
Protecting Your Privacy at the Border
Our lives are on our laptops – family photos, medical documents, banking... |
Ethics, Society & Politics | ||
QualityLand
Willkommen in QualityLand, in einer nicht allzu fernen Zukunft: Alles läuft... |
Ethics, Society & Politics | ||
Regulating Autonomous Weapons
Depending on the definition, autonomous weapon systems do not and might never... |
Ethics, Society & Politics | ||
Schreibtisch-Hooligans
Wie umgehen mit politischer Ohnmacht? Das Informationsfreiheitsgesetz bietet... |
Ethics, Society & Politics | ||
Social Bots, Fake News und Filterblasen
„Angriff der Meinungsroboter“ und „Gefangen in der Filterblase“ titelten die... |
Ethics, Society & Politics | ||
Social Cooling - big data’s unintended side effect
What does it mean to be free in a world where surveillance is the dominant... |
Ethics, Society & Politics | ||
Spy vs. Spy: A Modern Study Of Microphone Bugs Operation And Detection
In 2015, artist Ai Weiwei was bugged in his home, presumably by government... |
Ethics, Society & Politics | ||
Taxation
Taxation, the most "boring" #34c3 talk, but hey it's the economy stupid, and... |
Ethics, Society & Politics | ||
The seizure of the Iuventa
The ship „Iuventa“ of the organization „Jugend Rettet“ was seized on August... |
Ethics, Society & Politics | ||
The Snowden Refugees under Surveillance in Hong Kong
The Snowden Refugees’ actions to protect the world’s most significant whistle... |
Ethics, Society & Politics | ||
Think big or care for yourself
In German nursing science the dominant position on emergent technologies... |
Ethics, Society & Politics | ||
This is NOT a proposal about mass surveillance!
In November 2016 the UK has passed the Investigatory Powers Act (aka... |
Ethics, Society & Politics | ||
Tiger, Drucker und ein Mahnmal
Flüchtlingsfressende Tiger in Berlin, zum Diktatorensturz aufrufende... |
Ethics, Society & Politics | ||
Tightening the Net in Iran
How do Iranians experience the Internet? Various hurdles and risks exist for... |
Ethics, Society & Politics | ||
Trügerische Sicherheit
Wie steht es um die Sicherheitsversprechen, die mit dem Einsatz von neuen... |
Ethics, Society & Politics | ||
Uncertain Concern
Over 11 million undocumented immigrants live in the United States today.... |
Ethics, Society & Politics | ||
Uncovering British spies’ web of sockpuppet social media personas
The Joint Threat Research Intelligence Group (JTRIG), a unit in one of... |
Ethics, Society & Politics | ||
WTFrance
France is part of the top countries trying to destroy encryption, especially... |
Ethics, Society & Politics | ||
Zamir Transnational Network und Zagreb Dairy
Die Geschichte des ZAMIR Transnational Network und meines... |
Ethics, Society & Politics |
Hardware & Making
Title | Track | Speakers | |
---|---|---|---|
Blinkenrocket!
The Blinkenrocket is a DIY SMD Soldering Kit that was designed to teach... |
Hardware & Making | ||
Demystifying Network Cards
Network cards are often seen as black boxes: you put data in a socket on one... |
Hardware & Making | ||
Designing PCBs with code
An overview and history of various tools and languages that allow you to use... |
Hardware & Making | ||
Digitale Bildung in der Schule
„5.-Klässlerinnen, die über die Millisekunden für einen delay()-Aufruf... |
Hardware & Making | ||
Electroedibles
Electroedibles is an experiment with “edible” hardware that explores the... |
Hardware & Making | ||
Home Distilling
This talk covers the theory, legality and economics of home distilling. We... |
Hardware & Making | ||
Low Cost Non-Invasive Biomedical Imaging
An open source biomedical imaging project using electrical impedance... |
Hardware & Making | ||
Making Experts Makers and Makers Experts
Over the past year, we have been developing open source wheelchair add-ons... |
Hardware & Making | ||
“Nabovarme” opensource heating infrastructure in Christiania
Project “Nabovarme” (meaning “neighbour heating”) has transformed private... |
Hardware & Making | ||
Opening Closed Systems with GlitchKit
Systems that hide their firmware-- often deep in readout-protected flash or... |
Hardware & Making | ||
openPower - the current state of commercial openness in CPU development
How does developing future processors with yesterdays capabilities work out... |
Hardware & Making | ||
Public FPGA based DMA Attacking
Most thought Direct Memory Access (DMA) attacks were a thing of the past... |
Hardware & Making | ||
Reverse engineering FPGAs
In this talk I describe the basic makeup of FPGAs and how I reverse... |
Hardware & Making | ||
Running GSM mobile phone on SDR
Since SDR (Software Defined Radio) becomes more popular and more available... |
Hardware & Making | ||
Schnaps Hacking
This talk covers the theory, the required tools and how to make them, and the... |
Hardware & Making | ||
The making of a chip
You are surrounded by ICs. Yet you probably don't know much about how such a... |
Hardware & Making | ||
The Ultimate Apollo Guidance Computer Talk
The Apollo Guidance Computer ("AGC") was used onboard the Apollo spacecraft... |
Hardware & Making | ||
Unleash your smart-home devices: Vacuum Cleaning Robot Hacking
Did you ever want to run your own IoT cloud on your IoT devices? Or did you... |
Hardware & Making | ||
Vintage Computing for Trusted Radiation Measurements and a World Free of Nuclear Weapons
Eliminating nuclear weapons will require trusted measurement systems to... |
Hardware & Making |
Resilience
Title | Track | Speakers | |
---|---|---|---|
Briar
Briar is a peer-to-peer messaging app that is resistant to censorship and... |
Resilience | ||
Bringing Linux back to server boot ROMs with NERF and Heads
The NERF and Heads projects bring Linux back to the cloud servers' boot ROMs... |
Resilience | ||
Coming Soon: Machine-Checked Mathematical Proofs in Everyday Software and Hardware Development
Most working engineers view machine-checked mathematical proofs as an... |
Resilience | ||
Deep Learning Blindspots
In the past decade, machine learning researchers and theorists have created... |
Resilience | ||
Ein Festival der Demokratie
Erfahrungen und Details zu den zwei kritischen Medienprojekten FC/MC... |
Resilience | ||
End-to-end formal ISA verification of RISC-V processors with riscv-formal
Formal hardware verification (hardware model checking) can prove that a... |
Resilience | ||
Growing Up Software Development
Hacker culture overcomes limitations in computer systems through creativity... |
Resilience | ||
hacking disaster
Gesundheit als entscheidender Teil von Glück und Zufriedenheit ist bis in... |
Resilience | ||
Hardening Open Source Development
<p>As authors it is our responsibility to build secure software and give each... |
Resilience | ||
How Alice and Bob meet if they don't like onions
There exists no such thing as a perfect anonymity network with low latency,... |
Resilience | ||
How can you trust formally verified software?
Formal verification of software has finally started to become viable: we have... |
Resilience | ||
library operating systems
Traditional models of application development involve talking to an... |
Resilience | ||
May contain DTraces of FreeBSD
Systems are getting increasingly complex and it's getting harder to... |
Resilience | ||
Mietshäusersyndikat: den Immobilienmarkt hacken
Das Mietshäusersyndikat ist eine nicht-kommerzielle Kooperative mit... |
Resilience | ||
Modern key distribution with ClaimChain
ClaimChain is a Public Key Infrastructure unique in that it can operate in... |
Resilience | ||
OONI: Let's Fight Internet Censorship, Together!
How can we take a stand against the increasing shadow of Internet censorship?... |
Resilience | ||
Organisational Structures for Sustainable Free Software Development
What kind of organisational structures exist for free software projects? What... |
Resilience | ||
Practical Mix Network Design
We shall explain the renewed interest in mix networks. Like Tor, mix networks... |
Resilience | ||
The Internet in Cuba: A Story of Community Resilience
Internet access in Cuba is notoriously restrictive. ETECSA, the... |
Resilience |
Entertainment
Title | Track | Speakers | |
---|---|---|---|
Hacker Jeopardy
The Hacker Jeopardy is a quiz show. |
Entertainment | ||
Hacker Jeopardy Stream
The Hacker Jeopardy is a quiz show. -- Stream |
Entertainment |
|
|
Inside AfD
Herbst 2017. Irgendwo in Deutschland. Die führenden Köpfe der AfD träumen von... |
Entertainment | ||
Methodisch inkorrekt!
Der IgNobelpreis ist eine Auszeichnung, um wissenschaftliche Leistungen zu... |
Entertainment | ||
Nougatbytes 11₂
Zwei Teams mit rauchenden Köpfen und ein johlendes Publikum raten sich durch... |
Entertainment |