
64 min
Can trains be hacked?
Die Technik der Eisenbahnsicherungsanlagen

128 min
Der Staatstrojaner
Vom braunen Briefumschlag bis zur Publikation

60 min
The Atari 2600 Video Computer System: The Ultimate Talk
The history, the hardware and how to write programs

32 min
Antiforensik
Einführung in das Thema Antiforensik am Beispiel eines…

55 min
Introducing Osmo-GMR
Building a sniffer for the GMR satphones

63 min
Print Me If You Dare
Firmware Modification Attacks and the Rise of Printer…

57 min
802.11 Packets in Packets
A Standard-Compliant Exploit of Layer 1

56 min
Effective Denial of Service attacks against web application platforms
We are the 99% (CPU usage)

62 min
Bionic Ears
Introduction into State-of-the-Art Hearing Aid Technology

62 min
Cellular protocol stacks for Internet
GPRS, EDGE, UMTS, HSPA demystified

45 min
Implementation of MITM Attack on HDCP-Secured Links
A non-copyright circumventing application of the HDCP…

51 min
Apple vs. Google Client Platforms
How you end up being the Victim.

52 min
The engineering part of social engineering
Why just lying your way in won't get you anywhere

61 min
Time is on my Side
Exploiting Timing Side Channel Vulnerabilities on the Web

34 min
NOC Review
NOC Review about the Camp 2011 and the 28C3

53 min
Building a Distributed Satellite Ground Station Network - A Call To Arms
Hackers need satellites. Hackers need internet over…

67 min
Datenvieh oder Daten-Fee
Welchen Wert haben Trackingdaten?

62 min
Automatic Algorithm Invention with a GPU
Hell Yeah, it's rocket science

54 min
Datamining for Hackers
Encrypted Traffic Mining

63 min
Power gadgets with your own electricity
escape the basement and make the sun work for you

65 min
Quantified-Self and OpenBCI Neurofeedback Mind-Hacking
Transhumanism, Self-Optimization and Neurofeedback for…

56 min
Rootkits in your Web application
Achieving a permanent stealthy compromise of user accounts…

25 min
Security Log Visualization with a Correlation Engine
What's inside your network?

28 min
Ooops I hacked my PBX
Why auditing proprietary protocols matters

51 min
SCADA and PLC Vulnerabilities in Correctional Facilities
Tiffany Rad, Teague Newman, John Strauchs

26 min
Don't scan, just ask
A new approach of identifying vulnerable web applications

47 min
String Oriented Programming
Circumventing ASLR, DEP, and Other Guards

59 min
Deceiving Authorship Detection
Tools to Maintain Anonymity Through Writing Style & Current…

41 min
DC+, The Protocol
Technical defense against data retention law

26 min
Data Mining the Israeli Census
Insights into a publicly available registry

56 min
The future of cryptology: which 3 letters algorithm(s) could be our Titanic?
RMS Olympic, RMS Titanic, HMHS Britannic vs Discrete…

57 min
Hacking MFPs
Part2 - PostScript: Um, you've been hacked

55 min
Ein Mittelsmannangriff auf ein digitales Signiergerät
Bachelorarbeit Informatik Uni Kiel SS 2011

26 min
ChokePointProject - Quis custodiet ipsos custodes?
Aggregating and Visualizing (lack of) Transparancy Data in…

45 min
Your Disaster/Crisis/Revolution just got Pwned
Telecomix and Geeks without Bounds on Security and Crisis…

62 min
Post Memory Corruption Memory Analysis
Automating exploitation of invalid memory writes

60 min
Macro dragnets: Why trawl the river when you can do the whole ocean
What happens when data collection goes awry in the 21st…

57 min
Evolving custom communication protocols
Hell Yeah, it's rocket science

64 min