11:30 |
Running your own GSM network
Event type lecture
Track Hacking
|
The Privacy Workshop Project
Enhancing the value of privacy in todays students view
Event type lecture
Track Society
|
11:45 |
12:00 |
12:15 |
12:30 |
|
|
|
12:45 |
eVoting after Nedap and Digital Pen
Why cryptography might not fix the issue of transparent elections
Event type lecture
Track Society
|
Repurposing the TI EZ430U
with msp430static, solder, and syringe
Event type lecture
Track Making
|
Zehn Big Brother Awards in .at
Rückblick über eine bewegte Zeit
Event type lecture
Track Society
|
13:00 |
13:15 |
13:30 |
13:45 |
|
|
|
14:00 |
Neusprech im Überwachungsstaat
Politikersprache zwischen Orwell und Online
Event type lecture
Track Society
|
Privacy in the social semantic web
Social networks based on XMPP
Event type lecture
Track Science
|
An introduction to new stream cipher designs
Turning data into line noise and back
Event type lecture
Track Hacking
|
14:15 |
14:30 |
14:45 |
15:00 |
|
|
|
15:15 |
|
|
|
15:30 |
|
|
|
15:45 |
|
|
|
16:00 |
Analyzing RFID Security
Event type lecture
Track Hacking
|
The Ultimate Commodore 64 Talk
Everything about the C64 in 64 Minutes
Event type lecture
Track Hacking
|
Squeezing Attack Traces
How to get useable information out of your honeypot
Event type lecture
Track Hacking
|
16:15 |
16:30 |
|
16:45 |
Stormfucker: Owning the Storm Botnet
Event type lecture
Track Hacking
|
17:00 |
|
|
17:15 |
DECT
The Digital Enhanced Cordless Telecommunications standard
Event type lecture
Track Hacking
|
Security and anonymity vulnerabilities in Tor
Past, present, and future
Event type lecture
Track Hacking
|
17:30 |
17:45 |
18:00 |
18:15 |
|
|
|
18:30 |
Attacking NFC mobile phones
First look at the security of NFC mobile phones
Event type lecture
Track Hacking
|
OnionCat – A Tor-based Anonymous VPN
Building an anonymous Internet within the Internet
Event type lecture
Track Hacking
|
SWF and the Malware Tragedy
Hide and Seek in A. Flash
Event type lecture
Track Hacking
|
18:45 |
19:00 |
19:15 |
19:30 |
|
|
|
19:45 |
|
|
|
20:00 |
|
|
|
20:15 |
|
|
|
20:30 |
Methods for Understanding Targeted Attacks with Office Documents
Event type lecture
Track Hacking
|
Der elektronische Personalausweis
Endlich wird jeder zum "Trusted Citizen"
Event type lecture
Track Society
|
20:45 |
21:00 |
21:15 |
21:30 |
|
|
|
21:45 |
Cisco IOS attack and defense
The State of the Art
Event type lecture
Track Hacking
|
Objects as Software: The Coming Revolution
How RepRap and physical compilers will change the world as we know it (and already have)
Event type lecture
Track Making
|
Weizenbaum
Rebel at work
Event type movie
Track Culture
|
22:00 |
22:15 |
22:30 |
22:45 |
|
|
|
23:00 |
|
23:15 |
|
23:30 |
|
23:45 |
|
00:00 |
|
00:15 |
|
00:30 |
|
00:45 |
|