Events for tag "Hacking"
58 min
Recovering keys and other secrets after power off
47 min
ISO14443, ISO15693, their GPL librfid implementation and…
44 min
Current Capabilities and Future Directions
38 min
Presentation of an innovative buffer overflow uncovering…
56 min
How we obtained the equivalent power of a Deep Crack for a…
56 min
Is implementation the enemy of design?
128 min
Vom braunen Briefumschlag bis zur Publikation
63 min
Overview of Current Keylogger Threats
44 min
Building an anonymous Internet within the Internet
95 min
by anatomizing Linux' CPRNG
60 min
The history, the hardware and how to write programs
128 min
presenting the first German Team participating in the…
51 min
3510 transistors in 60 minutes
45 min
A non-copyright circumventing application of the HDCP…
26 min
A new approach of identifying vulnerable web applications
52 min
Why just lying your way in won't get you anywhere
32 min
Einführung in das Thema Antiforensik am Beispiel eines…
52 min
A swiss army knife for automatic social investigation
49 min
Old Laws and New Technology the German Way
59 min
Little Security, Despite Obscurity
98 min
Essential Tips and Tricks
62 min
Bugs in Antivirus Software
61 min
Everything about the C64 in 64 Minutes
44 min
A Web Hacker's Bag O' Tricks
64 min
A major new version of freenet
51 min
Attacks on common failures when encrypting credit card…
59 min
One year of Rocket Science!
51 min
Tiffany Rad, Teague Newman, John Strauchs
135 min
Realtime in-building location tracking at the 23C3
61 min
Language/VM R&D, whole program type inference, translation…
40 min
A roundup of one the most advanced open hardware projects
52 min
Security Concepts, Problems, and Exploits on Your Mac
60 min
Hardware Hacks and Cracks with FPGAs
53 min
Satellite Tracking, harvesting and security
44 min
Presentation of the DyAnA Framework (Dynamic Android…
83 min
Maßgeschneiderte Geräte-Filtertreiber auf Knopfdruck
65 min
Behind the scenes of the new light installation
64 min
Computing of Tomorrow or Yesterday
45 min
Reconfigurable computing for the kernel
46 min
Chasing hackers with a bunch of monkeys
51 min
A look at the security of 3rd party iOS applications
48 min
publish-subscribe feeds + trust relationship network
64 min
Die Technik der Eisenbahnsicherungsanlagen
50 min
Open source BIOS replacement with a radical approach to…
48 min
Post-Exploitation Fun in Windows Environments
53 min
Teach yourself upper management in 22 days
68 min
How VMware, VirtualPC and Parallels actually work
63 min
escape the basement and make the sun work for you
57 min
how to own critical infrastructures
71 min
Experiences and lessons learned with the Payment Card…
54 min
Geschichten aus dem API-und Protokollkrieg von zwei…
48 min
Reverse Engineering von 3D-Dateiformaten
61 min
Causes, Attacks and Countermeasures
61 min
From analyzing to attacking mobile phones on a large scale.
46 min
Look what I found under the carpet
61 min
Better Living Through Inventing
55 min
Or: How I walked in and misbehaved
76 min
Breaking Remote Keyless Entry Systems with Power Analysis
79 min
Free RFID reader and emulator
92 min
Or: about what we will laugh next year
55 min
Open JTAG with Voltage Glitching
49 min
MMIrDA - Major Malfunction's InfraRed Discovery Application
46 min
"Mit Links" die Mauern Sozialer Netzwerke überwinden.
58 min
Some details about SIM cards
110 min
SPAM- und Zombie-Abwehr bei hohem Mail-Volumen am Beispiel…
62 min
GPRS, EDGE, UMTS, HSPA demystified
82 min
First look at the security of NFC mobile phones
53 min
Wie Hacker vorgehen und wie man sich schützen kann
70 min
Working with the open source BIOS replacement and getting a…
58 min
Pwning Apple's Mobile Internet Device
62 min
Automating exploitation of invalid memory writes
51 min
Getting deeper into AVR programming
62 min
Hell Yeah, it's rocket science
58 min
The Good, the Bad and the Ugly
64 min
A proposal for fixing attacks on CAs and DNSSEC
53 min
...and what the optimizer does so you don't have to
34 min
Introducing the 'lingua franca' of Instant Messaging
47 min
A short look at my pet project implementation
45 min
Reverse-engineering currency detection systems
55 min
Bachelorarbeit Informatik Uni Kiel SS 2011
46 min
Finding exploitable vulnerabilities in binaries
50 min
PowerLineCommunications has now their open source tool
67 min
Welchen Wert haben Trackingdaten?
43 min
Finding and exploiting concurrency issues in software
52 min
New RF technology - exciting for good guys, bad guys,…
64 min
Untersuchung eines Austauschsystems für hochsensible…
43 min
Firmware reverse-engineering tactics
48 min
How they track you when your mobile is switched off
45 min
Techniques and best practices to securely code your network…
53 min
How to find, invade and kill botnets automated and…
57 min
What you didn't know about Acrobat
44 min
Die abenteuerliche Analyse des Datenformats eines real…
51 min
Elevated to the Next Level
53 min
Erfahrungen aus der Praxis
56 min
Reverse Engineering the Motorola EZX (A768,A780,E680)…
32 min
Layer 8 based IP Address hijacking in the end of the days…
52 min
How to start analyzing blackboxes
65 min
Does dm-crypt and cryptoloop provide expected security when…
73 min
expanding the attack surface and then some
58 min
Tampering the Tamper-Proof
42 min
Practical VM exploiting based on CACAO
46 min
Was ist denn nun eigentlich so ein 'Interrupt'?
36 min
UAVs und andere spannende Dinge
42 min
A couple of stories about kernel exploiting
62 min
Introduction into State-of-the-Art Hearing Aid Technology
60 min
Kann ich dir ein Bier ausgeben?
90 min
Oder: worüber wir nächstes Jahr lachen werden
39 min
High performance/low power computing based on the analog…
48 min
Lets create the Arduino for FPGAs
87 min
Design of a blocking-resistant anonymity system
54 min
Ubiquitous wireless mesh clouds with olsrd from olsr.org
52 min
hardware demo during the lecture
61 min
Everything you need to know about Podcasting
57 min
bringing x86 fuckups to dalvik
46 min
Suppression of secure communications by governments
75 min
We Track Harder - We Track More! Take the pain out of…
66 min
Learn how to effectively protect not only your data but…
45 min
When physical security depends on IT security
31 min
Copy protection schemes of way back then and how they…
113 min
17 Mistakes Microsoft Made in the Xbox Security System &…
57 min
Take a look at software from a user's point of view and…
52 min
Wireless connections of 20km and more
57 min
Revisiting the legendary computer in a joystick
61 min
What has changed in DECT security after one year
50 min
Xbox 360, Playstation 3, Wii
53 min
How to find any book (and many other roadkills) on the…
46 min
a hackers guide into homebrewn 2.4GHz hardware & peripherals
93 min
A roundup and live demonstrations of all currently known…
65 min
writing, sniffing & emulating 13.56MHz RFID tags with…
56 min
Achieving a permanent stealthy compromise of user accounts…
55 min
Pixel Fuzzing and the Bioinformatic Bindiff
45 min
On automated video analysis of human behaviour
55 min
Open Source Dynamic Malware Analysis
45 min
Telecomix and Geeks without Bounds on Security and Crisis…
47 min
How bad security decisions can ruin a debit card design
51 min
How to build your own radar system
52 min
Hacking a 10 Gigabit Intrusion detection and prevention…
59 min
Tools to Maintain Anonymity Through Writing Style & Current…
47 min
Backdooring Embedded Controllers
50 min
An introduction into anonymous communication with I2P
56 min
RMS Olympic, RMS Titanic, HMHS Britannic vs Discrete…
85 min
Advanced internet searching strategies & "wizard seeking"…
34 min
XMPP ist viel mehr als nur Instant Messaging
54 min
An analysis of Apple's encrypted disk storage system
59 min
Fast development of object-oriented functional programs
59 min
Typische Sicherheitslücken
57 min
Hacking the Hackers with User-Space Virtualization
54 min
Consequences of Spam and Virus Filtering for the E-Mail…
28 min
Why auditing proprietary protocols matters
60 min
What happens when data collection goes awry in the 21st…
53 min
Hackers need satellites. Hackers need internet over…
53 min
Next generation vulnerabilities in 2.0 Web Applications
57 min
Improved approaches for auditive steganography
65 min
Applications of theorem proving for securing the windows…
60 min
Attacks, Defences and Public Policy Issues...
50 min
Writing your own flexible Userland TCP/IP Stack - Ninja…
61 min
Creating a rogue CA Certificate
62 min
Past, present, and future
61 min
Exploiting Timing Side Channel Vulnerabilities on the Web
53 min
An analysis of targeted attacks from 2005 to 2007
56 min
digital radio technology beyond GSM
50 min
Solutions for monitoring and lawful interception within a…
34 min
NOC Review about the Camp 2011 and the 28C3
66 min
all your baseband are belong to us
52 min
Scanning your GPRS/UMTS IP network for fun and profit
44 min
What the heck is realtime - and what to do with it
51 min
Wardriving phone networks
61 min
Practical attacks on GSM using GNU Radio and FPGAs
62 min
Attack Vectors Through the Eyes of Software-based Fault…
20 min
A peer-to-peer, end-to-end encrypted social networking…
56 min
How to Hack the Pfandsystem
46 min
Turning data into line noise and back
56 min
Discovering what the hardware architects try to hide from…
32 min
A better architecture for the web, beneficial to both…
52 min
A lamer's introduction to retrieving "sensitive"…
41 min
Technical defense against data retention law
63 min
Firmware Modification Attacks and the Rise of Printer…
71 min
Preventing Flash Exploits
49 min
Introduction to syscall proxying and applications for in…
57 min
Part2 - PostScript: Um, you've been hacked
61 min
Introducing Project OsmocomBB
41 min
"The Web Framework for perfectionists with deadlines."
65 min
Transhumanism, Self-Optimization and Neurofeedback for…
62 min
Keeping your enemies close
62 min
Hot or Not: Defeating anonymity by monitoring clock skew to…
57 min
An overview on design and generation of safe and reliable…
57 min
Vulnerabilities in the EMV Protocol
50 min
Eine Einführung in die neue, dynamische Sprache für das…
39 min
implants, sensory extension and silicon - all for you!
46 min
Wie man nach Hause telefoniert, ohne von einer Rakete…
47 min
An in-depth look at p2p algorithmics
59 min
How to find that special one out of millions
66 min
The Digital Enhanced Cordless Telecommunications standard
45 min
An overview of static and dynamic approaches
56 min
We are the 99% (CPU usage)
61 min
Essentielles Grundwissen für alle, die nichts zu verbergen…
45 min
"First we take Manhattan, then we take Berlin..."
43 min
An open-source project to develop a tool for broadband…
56 min
Watching the watchers, having fun with cctv cameras, making…
53 min
(also introducing libglitch)
117 min
No stone unturned or: logs, what logs?
56 min
Dissecting contemporary cellphone hardware
56 min
a dump of simple tools for embedded analysis at many layers
56 min
Profiling Modern Espionage
58 min
Corporations enabling citizens to print digital money
46 min
An Introduction to the usual mistakes
57 min
Back to the good old Blue Box?
47 min
Circumventing ASLR, DEP, and Other Guards
26 min
Insights into a publicly available registry
57 min
A Standard-Compliant Exploit of Layer 1
57 min
Hell Yeah, it's rocket science
47 min
Doing tricks with a mobile phone
29 min
WLANs mit Wi-Fi Protected Access (WPA) betreiben
61 min
Ethereal^W Wireshark without remote exploits - a proof of…
54 min
On Using Anonymizers and Still Get Fucked
35 min
A clever or ingenious device or expedient; adroit…
51 min
Abusing your Firmware to backdoor the kernel
55 min
The "anyOS" paradigm and its implications through…
72 min
Oder: worüber wir nächstes Jahr lachen werden
63 min
Symbian Exploit and Shellcode Development
59 min
The fascinating interplay of CPU, stack, C-compiler and…
52 min
Reverse-Engineering des Embedded-Linux-Navigationssystems
64 min
Why we will have more secure computers - tomorrow
48 min
Hide and Seek in A. Flash
94 min
Oder: worüber wir nächstes Jahr lachen werden
34 min
What you always wanted to know about Flash memory - but…
107 min
Breaking software in an automated fashion
42 min
Creation and detection of IP steganography for covert…
60 min
New Explorations: Large Graphs, Larger Threats
45 min
How to recognize trance coded communication patterns
25 min
Source routing attacks applied to SIP
38 min
How to get useable information out of your honeypot
34 min
How In The End We Got It All!
61 min
Not your mother's XSS bugs
60 min
Besitz und Wissen: Relay-Angriffe auf den neuen…
49 min
Wie funktioniert TCP mit 2kb RAM?
63 min
or how B.A.T.M.A.N. learned to fly
50 min
A practical guide to Differential Power Analysis
76 min
SAP Security and the Enterprise
49 min
Introduction to SIP Hacking
63 min
Mandatory Access Control und TPM in Xen
34 min
Nasty effects with tracker-less BitTorrent
49 min
How bureaucrats fail to fight terror
26 min
Aggregating and Visualizing (lack of) Transparancy Data in…
44 min
New ideas for old practices
55 min
Building a sniffer for the GMR satphones
25 min
What's inside your network?
61 min
Bestandsaufnahme und Auswirkungen
53 min
Why C++ is bad for the environment, causes global warming…
69 min
Encrypting (GSM) mobile phone calls over VPN with an…
60 min
Programmierbare Logik für Deinen Hardware…
64 min
Oder: worüber wir nächstes Jahr lachen werden
115 min
Implementation and detection of kernel based backdoors and…
30 min
Accepting the Partial Disclosure Challenge
119 min
Ein Einblick in die Security-Industrie
57 min
Why developing Secure Software is like playing Marble…
51 min
How you end up being the Victim.
47 min
Impacts of undefined behaviour and other C oddities
54 min
Take a lot of Perl, add some OpenSSL, sprinkle it with a…
78 min
Challenges in detecting system compromises and why we’re so…
55 min
Mitigating cold-boot attacks for Full-Disk-Encryption…