29C3 - Version 1.9

F/a{hr-p).l//a,n
2.9/C-3

Programm Day 3

Saal 1 Saal 4 Saal 6 Saal 17
Saal 1 Saal 4 Saal 6 Saal 17
11:00

Deutschlandfunk @ 29C3

Interviews, Talkrunden, Kennenlernen

11:15
11:30

CCC-Jahresrückblick

Securing the Campaign

Security and the 2012 US Presidential Election

CVE-2011-3402 Technical Analysis

11:45
12:00
12:15
12:30
12:45

Lightning Talks 2

5 Minutes of Fame

Stabilitätsanker & Wachstumslokomotive

13:00
13:15

Ethics in Security Research

13:30
13:45
14:00

Analytical Summary of the BlackHole Exploit Kit

Almost Everything You Ever Wanted To Know About The BlackHole Exploit Kit

On Breaking SAML

Be Whoever You Want to Be

14:15
14:30

Small footprint inspection techniques for Android

Reverse engineering on Android platforms

14:45
15:00
15:15
15:30
15:45
16:00

Open Source Schlüssel und Schlösser

Offene Quellen zum Bösen und Guten: von downloadbaren Handschellenschlüsseln zu sicheren elektronischen Schlössern

Privatisierung der Rechtsdurchsetzung

Von ACTA, IPRED und Freunden

An Overview of Secure Name Resolution

DNSSEC, DNSCurve and Namecoin

16:15

Live-Sendung »Computer und Kommunikation«

Deutschlandfunk @ 29C3

16:30
16:45
17:00

Deutschlandfunk @ 29C3

Interviews, Talkrunden, Kennenlernen

17:15

Writing a Thumbdrive from Scratch

Prototyping Active Disk Antiforensics

Sind faire Computer möglich?

Long live the protocoletariat!

17:30
17:45
18:00
18:15
18:30

Russia’s Surveillance State

Low-Cost Chip Microprobing

Hacking Philosophy

Digitale Mündigkeit, Technikpaternalismus und warum wir Netzphilosophie brauchen

18:45
19:00
19:15
19:30
19:45
20:00
20:15
20:30

Milking the Digital Cash Cow

Extracting Secret Keys of Contactless Smartcards

Security Evaluation of Russian GOST Cipher

Survey of All Known Attacks on Russian Government Encryption Standard

A Rambling Walk Through an EMV Transaction

20:45
21:00
21:15
21:30
21:45

Further hacks on the Calypso platform

or how to turn a phone into a BTS

Hash-flooding DoS reloaded: attacks and defenses

Men who stare at bits

RFID-Studierendenkarten mit Fehlern

22:00
22:15
22:30
22:45
23:00

Fnord-Jahresrückblick

Diesmal mit noch mehr Eurozonen-Spaltung!

Pflanzenhacken richtig

Einblicke in die Weizenzüchtung

The future of protocol reversing and simulation applied on ZeroAccess botnet

Mapping your enemy Botnet with Netzob

23:15
23:30
23:45
Archived page - Impressum/Datenschutz