28th Chaos Communication Congress Behind Enemy Lines

tackynonchalantSoftware and s/w Development

Dec 3, 2013 (3 years and 8 months ago)

72 views

SPEAKER
EVENTS
Index
Day 1 - 2011-12-27
Day 2 - 2011-12-28
Day 3 - 2011-12-29
Day 4 - 2011-12-30
Speakers
Events
Community
Culture
Hacking
Making
Science
Show
Society and Politics
28C3 - Version 2.3
28th Chaos Communication
Congress

Behind Enemy Lines
0zapfths
Der Staatstrojaner
Alexander
‘alech’ Klink
Effective Denial of Service
attacks against web application
platforms
Alexander
Koch
Ein Mittelsmannangriff auf ein
digitales Signiergerät
Alexander
Müller
Politik hacken
Alex Antener
"Neue Leichtigkeit"
Alien8
Pentanews Game Show 2k11/3
Aluc
The engineering part of social
engineering
Amelie
Boehm
"Neue Leichtigkeit"
Andreas Bogk
Jahresrückblick
Andreas -
horn- Hornig
Building a Distributed Satellite
Ground Station Network - A Call
To Arms
Andreas
Krisch
EU-Datenschutz und das
Internet der Dinge
EU-Datenschutz und das
Internet der Dinge (english
translation)
Andrei Costin
Hacking MFPs
Andrin Uetz
"Neue Leichtigkeit"
Andy Müller-
Maguhn
BuggedPlanet
Ang Cui
Print Me If You Dare
Anne Roth
Sachsen dreht frei
Artur Janc
Rootkits in your Web application
Barı
The movements against state-
controlled Internet in Turkey
Bärwulf
Kannitschreiber
Politik hacken
Bastian
Greshake
Crowdsourcing Genome Wide
Association Studies
Benjamin
Kellermann
NPC - Nerds’ Pissing Contest
Bicyclemark
7 years, 400+ podcasts, and a
whole lot of Frequent Flyer
Miles
Brenno de
Winter
Changing techno-optimists by
shaking up the bureaucrats
Bruhns
Apple vs. Google Client
Platforms
bunnie
Implementation of MITM Attack
on HDCP-Secured Links
Caspar
Clemens
Mierau
The Hack will not be televised?
Cathrine
Kramer
Eating in the Anthropocene
Chris Kubecka
Security Log Visualization with a
Correlation Engine
Christian
Bahls -
MOGiS e.V.
Counterlobbying EU institutions
Christian
Bahls --
MOGiS e.V. -
Eine Stimme der
Vernunft
What is WhiteIT and what does
it aim for?
Christian
Kleineidam
Quantified-Self and OpenBCI
Neurofeedback Mind-Hacking
Christoph
Engemann
What is in a name?
Conrad Lee
Privacy Invasion or Innovative
Science?
Constanze
Kurz
Der Staatstrojaner
Jahresrückblick
Cory
Doctorow
The coming war on general
computation
Dan Kaminsky
Black Ops of TCP/IP 2011
Dario
Carluccio
Smart Hacking For Privacy
David Kim
KinectFusion
Drew Fisher
Reverse Engineering USB
Devices
endrazine
endrazine
Post Memory Corruption
Memory Analysis
Erdgeist
Jahresrückblick
Eric Filiol
Taking control over the Tor
network
Evgeny
Morozov
Marriage From Hell: On the
Secret Love Affair Between
Dictators and Western
Technology Companies
Fabian
Mihailowitsch
Don't scan, just ask
Falk Lüke
Echtes Netz
Felix von
Leitner
Fnord-Jahresrückblick
Frank Rieger
Closing Event
Der Staatstrojaner
Fnord-Jahresrückblick
Jahresrückblick
Security Nightmares
FX of
Phenoelit
Apple vs. Google Client
Platforms
greg
Apple vs. Google Client
Platforms
Guillaume
Delugré
Reverse-engineering a
Qualcomm baseband
Gunnar Thöle
Power gadgets with your own
electricity
hadez
Building a Distributed Satellite
Ground Station Network - A Call
To Arms
Harald Welte
Cellular protocol stacks for
Internet
Helga
Velroyen
Bionic Ears
Herr Urbach
Your Disaster/Crisis/Revolution
just got Pwned
Jacob
Appelbaum
How governments have tried to
block Tor
Jean-Jacques
Quisquater
The future of cryptology: which
3 letters algorithm(s) could be
our Titanic?
Jérémie
Zimmermann
Counterlobbying EU institutions
Jesse Ou
New Ways I'm Going to Hack
Your Web App
_john
Pentanews Game Show 2k11/3
Jonas Bischof
"Neue Leichtigkeit"
Jonathan
Voris
Print Me If You Dare
Jörg Dürre
Power gadgets with your own
electricity
Josephine
Fischer
Demokratie auf Sächsisch
Julian | zeri
Effective Denial of Service
attacks against web application
platforms
Kai Denker
Does Hacktivism Matter?
Karsten
Becker
Not your Grandfathers moon
landing
Karsten Nohl
Defending mobile phones
Kay
NOC Review
Kay Hamacher
Bitcoin - An Analysis
Resilience Towards Leaking or
Why Julian Assange Might Be
Wrong After All
klobs
DC+, The Protocol
NPC - Nerds’ Pissing Contest
Pentanews Game Show 2k11/3
lilafisch
r0ket++
Luca Melette
Defending mobile phones
maha/Martin
Haase
„Die Koalition setzt sich aber
aktiv und ernsthaft dafür ein“
Markus
Beckedahl
Echtes Netz
Martin
Wundram
Antiforensik
Mathias Payer
String Oriented Programming
Meredith L.
Patterson
The Science of Insecurity
MetaMind
Evolution
Quantified-Self and OpenBCI
Neurofeedback Mind-Hacking
Michael
Brennan
Deceiving Authorship Detection
Montserrat
Politik hacken
Graupenschläger
Nick Farr
Lightning Talks Day 2
Lightning Talks Day 3
Lightning Talks Day 4
Ninja / The
Dreams
Behind the scenes of a C64
demo
Peio Popov
Electronic money: The road to
Bitcoin and a glimpse forward
Peter
Eckersley
Sovereign Keys
Philipp Bayer
Crowdsourcing Genome Wide
Association Studies
pt
Ooops I hacked my PBX
Rachel
Greenstadt
Deceiving Authorship Detection
Ray
Hacker Jeopardy
Redbeard
Macro dragnets: Why trawl the
river when you can do the whole
ocean
Renaud
Devaliere
The future of cryptology: which
3 letters algorithm(s) could be
our Titanic?
Rene
Meissner
Datenvieh oder Daten-Fee
Reporters
Without
Borders
From Press Freedom to the
Freedom of information
Rich
New Ways I'm Going to Hack
Your Web App
Robert
Robert
Böhme
Not your Grandfathers moon
landing
Robert
Helling
Quantum of Science
Robin Upton
A Brief History of Plutocracy
Roger
Dingledine
How governments have tried to
block Tor
Ron
Security Nightmares
Ruben
Bloemgarten
ChokePointProject - Quis
custodiet ipsos custodes?
ruedi tobler
"Neue Leichtigkeit"
Samuel
Weniger
"Neue Leichtigkeit"
Sebastian
Schinzel
Time is on my Side
seda
The movements against state-
controlled Internet in Turkey
Sergey
The Science of Insecurity
Seun
Omosowon
Taking control over the Tor
network
Simona Xnet
The best of The oXcars
Stefan
Burschka
Datamining for Hackers
Stefan
Katzenbeisser
Bitcoin - An Analysis
Can trains be hacked?
Stefan 'Sec'
Zehl
Hacker Jeopardy
Zehl
r0ket++
Stefan
Wehrmeyer
Frag den Staat
Stephan
Brinkhaus
Smart Hacking For Privacy
Susanne
Schultz
Almighty DNA?
Suso Baleato
Towards a Single Secure
European Cyberspace?
Sven Oliver
('SvOlli') Moll
The Atari 2600 Video Computer
System: The Ultimate Talk
Sylvain
Munaut
Introducing Osmo-GMR
Teague
SCADA and PLC Vulnerabilities
in Correctional Facilities
Tiffany Rad
SCADA and PLC Vulnerabilities
in Correctional Facilities
tilo
TRESOR: Festplatten sicher
verschlüsseln
Tobias
Naumann
Demokratie auf Sächsisch
Tom
Hargreaves
Open source music: Tracking 2.0
Travis
Goodspeed
802.11 Packets in Packets
Ulf
Buermeyer
Der Staatstrojaner
Uta
Wagenmann
Almighty DNA?
Wes Faler
Automatic Algorithm Invention
with a GPU
Evolving custom communication
protocols
Will Hargrave
NOC Review
willowbl00
Your Disaster/Crisis/Revolution
just got Pwned
Yuval Adam
Data Mining the Israeli Census
Zack Denfeld
Eating in the Anthropocene
Zoran Zaric
bup: Git for backups