28C3 - Version 2.3.5

28th Chaos Communication Congress
Behind Enemy Lines

Schedule Day 2

Saal 1 Saal 2 Saal 3
Saal 1 Saal 2 Saal 3
11:30

Politik hacken

Kleine Anleitung zur Nutzung von Sicherheitslücken gesellschaftlicher und politischer Kommunikation

Eating in the Anthropocene

Transgenic Fish, Mutagenic Grapefruits and Space Potatoes

11:45
12:00
12:15
12:30
12:45

Echtes Netz

Kampagne für Netzneutralität

Data Mining the Israeli Census

Insights into a publicly available registry

Lightning Talks Day 2

13:00
13:15

Don't scan, just ask

A new approach of identifying vulnerable web applications

13:30
13:45
14:00

Effective Denial of Service attacks against web application platforms

We are the 99% (CPU usage)

Reverse Engineering USB Devices

14:15
14:30

A Brief History of Plutocracy

14:45
15:00
15:15
15:30
15:45
16:00

The Science of Insecurity

Power gadgets with your own electricity

escape the basement and make the sun work for you

Privacy Invasion or Innovative Science?

Academia, social media data, and privacy

16:15
16:30
16:45
17:00
17:15

Hacking MFPs

Part2 - PostScript: Um, you've been hacked

Bionic Ears

Introduction into State-of-the-Art Hearing Aid Technology

Counterlobbying EU institutions

How to attempt to counter the influence of industry lobbyists and political forces aiming towards increasing control over the Internet

17:30
17:45
18:00
18:15
18:30

How governments have tried to block Tor

Time is on my Side

Exploiting Timing Side Channel Vulnerabilities on the Web

Ein Mittelsmannangriff auf ein digitales Signiergerät

Bachelorarbeit Informatik Uni Kiel SS 2011

18:45
19:00
19:15
19:30
19:45
20:00
20:15
20:30

„Die Koalition setzt sich aber aktiv und ernsthaft dafür ein“

Sprachlicher Nebel in der Politik

Rootkits in your Web application

Achieving a permanent stealthy compromise of user accounts with XSS and JS injection attacks.

Reverse-engineering a Qualcomm baseband

20:45
21:00
21:15
21:30
21:45

Apple vs. Google Client Platforms

How you end up being the Victim.

Building a Distributed Satellite Ground Station Network - A Call To Arms

Hackers need satellites. Hackers need internet over satellites. Satellites require ground stations. Let's build them!

Post Memory Corruption Memory Analysis

Automating exploitation of invalid memory writes

22:00
22:15
22:30
22:45
23:00

7 years, 400+ podcasts, and a whole lot of Frequent Flyer Miles

Lessons learned from producing a weekly independent podcast on international conflicts and concerns.

Quantified-Self and OpenBCI Neurofeedback Mind-Hacking

Transhumanism, Self-Optimization and Neurofeedback for post-modern hackers

Crowdsourcing Genome Wide Association Studies

Freeing Genetic Data from Corporate Vaults

23:15
23:30
23:45
00:00
00:15

Hacker Jeopardy

Number guessing for geeks

NPC - Nerds’ Pissing Contest

Mein Ruby ist besser als dein urxvt!

Hacker Jeopardy Translation

00:30
00:45
01:00
01:15
01:30
01:45
02:00