![Passive covert channels in the Linux kernel](https://static.media.ccc.de/media/congress/2004/176 Passive covert channels in the Linux kernel.jpg)
115 min
Passive covert channels in the Linux kernel
Implementation and detection of kernel based backdoors and…
![](https://static.media.ccc.de/media/congress/2004/import-bc7febd16b387304be-timeline.jpg)
![Sicherheitsanalyse von IT-Großprojekten der öffentlichen Hand](https://static.media.ccc.de/media/congress/2004/307 Gesundheitskarte.jpg)
64 min
Sicherheitsanalyse von IT-Großprojekten der öffentlichen Hand
Untersuchung eines Austauschsystems für hochsensible…
![](https://static.media.ccc.de/media/congress/2004/import-496dba1358b7997c25-timeline.jpg)
![The Convergence of Anti-Counterfeiting and Computer Security](https://static.media.ccc.de/media/congress/2004/108 The Convergence of Anti-Counterfeiting and Computer Security.jpg)
45 min
The Convergence of Anti-Counterfeiting and Computer Security
Reverse-engineering currency detection systems
![](https://static.media.ccc.de/media/congress/2004/import-76eda6a4d2ee2ee3de-timeline.jpg)