Events for tag "Hacking"
32 min
Einführung in das Thema Antiforensik am Beispiel eines…
76 min
Breaking Remote Keyless Entry Systems with Power Analysis
51 min
Tiffany Rad, Teague Newman, John Strauchs
56 min
a dump of simple tools for embedded analysis at many layers
51 min
3510 transistors in 60 minutes
56 min
We are the 99% (CPU usage)
42 min
Creation and detection of IP steganography for covert…
78 min
Challenges in detecting system compromises and why we’re so…
61 min
Language/VM R&D, whole program type inference, translation…
52 min
Wireless connections of 20km and more
55 min
Mitigating cold-boot attacks for Full-Disk-Encryption…
45 min
A non-copyright circumventing application of the HDCP…
65 min
writing, sniffing & emulating 13.56MHz RFID tags with…
85 min
Advanced internet searching strategies & "wizard seeking"…
68 min
How VMware, VirtualPC and Parallels actually work
62 min
Bugs in Antivirus Software
60 min
The history, the hardware and how to write programs
57 min
Back to the good old Blue Box?
36 min
UAVs und andere spannende Dinge
25 min
What's inside your network?
48 min
publish-subscribe feeds + trust relationship network
61 min
Ethereal^W Wireshark without remote exploits - a proof of…
44 min
Current Capabilities and Future Directions
47 min
Circumventing ASLR, DEP, and Other Guards
47 min
How bad security decisions can ruin a debit card design
49 min
Old Laws and New Technology the German Way
110 min
SPAM- und Zombie-Abwehr bei hohem Mail-Volumen am Beispiel…
60 min
Besitz und Wissen: Relay-Angriffe auf den neuen…
119 min
Ein Einblick in die Security-Industrie
35 min
A clever or ingenious device or expedient; adroit…
50 min
PowerLineCommunications has now their open source tool
57 min
Take a look at software from a user's point of view and…
107 min
Breaking software in an automated fashion
50 min
Eine Einführung in die neue, dynamische Sprache für das…
128 min
presenting the first German Team participating in the…
115 min
Implementation and detection of kernel based backdoors and…
56 min
How to Hack the Pfandsystem
58 min
Recovering keys and other secrets after power off
53 min
...and what the optimizer does so you don't have to
76 min
SAP Security and the Enterprise
83 min
Maßgeschneiderte Geräte-Filtertreiber auf Knopfdruck
44 min
Die abenteuerliche Analyse des Datenformats eines real…
57 min
how to own critical infrastructures
41 min
"The Web Framework for perfectionists with deadlines."
53 min
Hackers need satellites. Hackers need internet over…
57 min
What you didn't know about Acrobat
58 min
Pwning Apple's Mobile Internet Device
64 min
Die Technik der Eisenbahnsicherungsanlagen
59 min
The fascinating interplay of CPU, stack, C-compiler and…
52 min
Hacking a 10 Gigabit Intrusion detection and prevention…
41 min
Technical defense against data retention law
53 min
(also introducing libglitch)
51 min
Abusing your Firmware to backdoor the kernel
62 min
Hell Yeah, it's rocket science
48 min
Post-Exploitation Fun in Windows Environments
63 min
escape the basement and make the sun work for you
66 min
all your baseband are belong to us
57 min
Hell Yeah, it's rocket science
54 min
An analysis of Apple's encrypted disk storage system
59 min
One year of Rocket Science!
61 min
Everything about the C64 in 64 Minutes
79 min
Free RFID reader and emulator
44 min
Presentation of the DyAnA Framework (Dynamic Android…
53 min
How to find, invade and kill botnets automated and…
53 min
Why C++ is bad for the environment, causes global warming…
63 min
Mandatory Access Control und TPM in Xen
53 min
Satellite Tracking, harvesting and security
46 min
a hackers guide into homebrewn 2.4GHz hardware & peripherals
46 min
Chasing hackers with a bunch of monkeys
60 min
Programmierbare Logik für Deinen Hardware…
50 min
Solutions for monitoring and lawful interception within a…
30 min
Accepting the Partial Disclosure Challenge
46 min
An Introduction to the usual mistakes
61 min
Creating a rogue CA Certificate
55 min
Open Source Dynamic Malware Analysis
26 min
Insights into a publicly available registry
46 min
Finding exploitable vulnerabilities in binaries
90 min
Oder: worüber wir nächstes Jahr lachen werden
71 min
Preventing Flash Exploits
61 min
Practical attacks on GSM using GNU Radio and FPGAs
62 min
Attack Vectors Through the Eyes of Software-based Fault…
56 min
How we obtained the equivalent power of a Deep Crack for a…
56 min
RMS Olympic, RMS Titanic, HMHS Britannic vs Discrete…
60 min
Attacks, Defences and Public Policy Issues...
62 min
Hot or Not: Defeating anonymity by monitoring clock skew to…
61 min
Bestandsaufnahme und Auswirkungen
53 min
Wie Hacker vorgehen und wie man sich schützen kann
34 min
XMPP ist viel mehr als nur Instant Messaging
38 min
Presentation of an innovative buffer overflow uncovering…
43 min
An open-source project to develop a tool for broadband…
52 min
Reverse-Engineering des Embedded-Linux-Navigationssystems
56 min
Reverse Engineering the Motorola EZX (A768,A780,E680)…
55 min
Open JTAG with Voltage Glitching
54 min
Take a lot of Perl, add some OpenSSL, sprinkle it with a…
50 min
Open source BIOS replacement with a radical approach to…
113 min
17 Mistakes Microsoft Made in the Xbox Security System &…
64 min
Untersuchung eines Austauschsystems für hochsensible…
63 min
Firmware Modification Attacks and the Rise of Printer…
98 min
Essential Tips and Tricks
34 min
NOC Review about the Camp 2011 and the 28C3
62 min
Automating exploitation of invalid memory writes
67 min
Welchen Wert haben Trackingdaten?
59 min
How to find that special one out of millions
56 min
digital radio technology beyond GSM
57 min
Vulnerabilities in the EMV Protocol
52 min
A swiss army knife for automatic social investigation
60 min
New Explorations: Large Graphs, Larger Threats
92 min
Or: about what we will laugh next year
47 min
Impacts of undefined behaviour and other C oddities
56 min
Discovering what the hardware architects try to hide from…
56 min
Dissecting contemporary cellphone hardware
45 min
Reverse-engineering currency detection systems
45 min
Reconfigurable computing for the kernel
50 min
An introduction into anonymous communication with I2P
61 min
Causes, Attacks and Countermeasures
58 min
Corporations enabling citizens to print digital money
66 min
Learn how to effectively protect not only your data but…
31 min
Copy protection schemes of way back then and how they…
57 min
An overview on design and generation of safe and reliable…
49 min
Wie funktioniert TCP mit 2kb RAM?
61 min
Introducing Project OsmocomBB
52 min
Scanning your GPRS/UMTS IP network for fun and profit
52 min
A lamer's introduction to retrieving "sensitive"…
61 min
Essentielles Grundwissen für alle, die nichts zu verbergen…
51 min
A look at the security of 3rd party iOS applications
58 min
The Good, the Bad and the Ugly
61 min
Exploiting Timing Side Channel Vulnerabilities on the Web
61 min
From analyzing to attacking mobile phones on a large scale.
52 min
New RF technology - exciting for good guys, bad guys,…
45 min
How to recognize trance coded communication patterns
45 min
When physical security depends on IT security
32 min
A better architecture for the web, beneficial to both…
54 min
On Using Anonymizers and Still Get Fucked
62 min
Introduction into State-of-the-Art Hearing Aid Technology
71 min
Experiences and lessons learned with the Payment Card…
26 min
A new approach of identifying vulnerable web applications
46 min
Wie man nach Hause telefoniert, ohne von einer Rakete…
57 min
Revisiting the legendary computer in a joystick
34 min
Nasty effects with tracker-less BitTorrent
64 min
Oder: worüber wir nächstes Jahr lachen werden
65 min
Behind the scenes of the new light installation
117 min
No stone unturned or: logs, what logs?
65 min
Does dm-crypt and cryptoloop provide expected security when…
49 min
Introduction to SIP Hacking
57 min
A Standard-Compliant Exploit of Layer 1
47 min
Doing tricks with a mobile phone
51 min
How you end up being the Victim.
61 min
What has changed in DECT security after one year
75 min
We Track Harder - We Track More! Take the pain out of…
55 min
Building a sniffer for the GMR satphones
60 min
What happens when data collection goes awry in the 21st…
59 min
Typische Sicherheitslücken
63 min
Symbian Exploit and Shellcode Development
26 min
Aggregating and Visualizing (lack of) Transparancy Data in…
94 min
Oder: worüber wir nächstes Jahr lachen werden
44 min
New ideas for old practices
20 min
A peer-to-peer, end-to-end encrypted social networking…
64 min
A major new version of freenet
39 min
implants, sensory extension and silicon - all for you!
64 min
A proposal for fixing attacks on CAs and DNSSEC
45 min
Techniques and best practices to securely code your network…
42 min
Practical VM exploiting based on CACAO
82 min
First look at the security of NFC mobile phones
45 min
An overview of static and dynamic approaches
65 min
Applications of theorem proving for securing the windows…
49 min
MMIrDA - Major Malfunction's InfraRed Discovery Application
54 min
Geschichten aus dem API-und Protokollkrieg von zwei…
49 min
Introduction to syscall proxying and applications for in…
55 min
Pixel Fuzzing and the Bioinformatic Bindiff
45 min
On automated video analysis of human behaviour
55 min
The "anyOS" paradigm and its implications through…
44 min
Building an anonymous Internet within the Internet
53 min
An analysis of targeted attacks from 2005 to 2007
53 min
How to find any book (and many other roadkills) on the…
93 min
A roundup and live demonstrations of all currently known…
62 min
Keeping your enemies close
57 min
Part2 - PostScript: Um, you've been hacked
51 min
Elevated to the Next Level
47 min
ISO14443, ISO15693, their GPL librfid implementation and…
42 min
A couple of stories about kernel exploiting
47 min
A short look at my pet project implementation
66 min
The Digital Enhanced Cordless Telecommunications standard
57 min
Improved approaches for auditive steganography
53 min
Teach yourself upper management in 22 days
46 min
"Mit Links" die Mauern Sozialer Netzwerke überwinden.
48 min
Reverse Engineering von 3D-Dateiformaten
64 min
Computing of Tomorrow or Yesterday
70 min
Working with the open source BIOS replacement and getting a…
29 min
WLANs mit Wi-Fi Protected Access (WPA) betreiben
50 min
A practical guide to Differential Power Analysis
46 min
Was ist denn nun eigentlich so ein 'Interrupt'?
62 min
GPRS, EDGE, UMTS, HSPA demystified
48 min
How they track you when your mobile is switched off
38 min
How to get useable information out of your honeypot
48 min
Hide and Seek in A. Flash
60 min
Hardware Hacks and Cracks with FPGAs
55 min
Or: How I walked in and misbehaved
57 min
Why developing Secure Software is like playing Marble…
63 min
Overview of Current Keylogger Threats
50 min
Writing your own flexible Userland TCP/IP Stack - Ninja…
56 min
Watching the watchers, having fun with cctv cameras, making…
54 min
Ubiquitous wireless mesh clouds with olsrd from olsr.org
44 min
A Web Hacker's Bag O' Tricks
49 min
How bureaucrats fail to fight terror
57 min
Hacking the Hackers with User-Space Virtualization
47 min
An in-depth look at p2p algorithmics
56 min
Achieving a permanent stealthy compromise of user accounts…
25 min
Source routing attacks applied to SIP
44 min
What the heck is realtime - and what to do with it
39 min
High performance/low power computing based on the analog…
54 min
Consequences of Spam and Virus Filtering for the E-Mail…
51 min
Getting deeper into AVR programming
46 min
Turning data into line noise and back
72 min
Oder: worüber wir nächstes Jahr lachen werden
59 min
Tools to Maintain Anonymity Through Writing Style & Current…
59 min
Fast development of object-oriented functional programs
34 min
Introducing the 'lingua franca' of Instant Messaging
56 min
Profiling Modern Espionage
58 min
Tampering the Tamper-Proof
52 min
How to start analyzing blackboxes
56 min
Is implementation the enemy of design?
32 min
Layer 8 based IP Address hijacking in the end of the days…
95 min
by anatomizing Linux' CPRNG
65 min
Transhumanism, Self-Optimization and Neurofeedback for…
53 min
Erfahrungen aus der Praxis
61 min
Better Living Through Inventing
59 min
Little Security, Despite Obscurity
62 min
Past, present, and future
51 min
Attacks on common failures when encrypting credit card…
40 min
A roundup of one the most advanced open hardware projects
51 min
How to build your own radar system
52 min
hardware demo during the lecture
53 min
Next generation vulnerabilities in 2.0 Web Applications
64 min
Why we will have more secure computers - tomorrow
46 min
Suppression of secure communications by governments
135 min
Realtime in-building location tracking at the 23C3
48 min
Lets create the Arduino for FPGAs
50 min
Xbox 360, Playstation 3, Wii
61 min
Everything you need to know about Podcasting
45 min
Telecomix and Geeks without Bounds on Security and Crisis…
34 min
How In The End We Got It All!
43 min
Firmware reverse-engineering tactics
73 min
expanding the attack surface and then some
58 min
Some details about SIM cards
63 min
or how B.A.T.M.A.N. learned to fly
57 min
bringing x86 fuckups to dalvik
87 min
Design of a blocking-resistant anonymity system
52 min
Security Concepts, Problems, and Exploits on Your Mac
43 min
Finding and exploiting concurrency issues in software
47 min
Backdooring Embedded Controllers
45 min
"First we take Manhattan, then we take Berlin..."
61 min
Not your mother's XSS bugs
51 min
Wardriving phone networks
69 min
Encrypting (GSM) mobile phone calls over VPN with an…
52 min
Why just lying your way in won't get you anywhere
46 min
Look what I found under the carpet
55 min
Bachelorarbeit Informatik Uni Kiel SS 2011
28 min
Why auditing proprietary protocols matters
128 min
Vom braunen Briefumschlag bis zur Publikation
60 min
Kann ich dir ein Bier ausgeben?
34 min
What you always wanted to know about Flash memory - but…