28C3 - Version 0.3
28th Chaos Communication Congress
Behind Enemy Lines
Schedule Day 3
| Saal 1 | Saal 2 | Saal 3 | |
|---|---|---|---|
| Saal 1 | Saal 2 | Saal 3 | |
| 11:30 | |||
| 11:45 | |||
| 12:00 | |||
| 12:15 | |||
| 12:30 |
Real-time 3D Reconstruction and Interaction Using a Moving Depth Camera |
||
| 12:45 | |||
| 13:00 | |||
| 13:15 | |||
| 13:30 | |||
| 13:45 | |||
| 14:00 | |||
| 14:15 | |||
| 14:30 | |||
| 14:45 | |||
| 15:00 | |||
| 15:15 | |||
| 15:30 | |||
| 15:45 | |||
| 16:00 |
7 years, 400+ podcasts, and a whole lot of Frequent Flyer Miles Lessons learned from producing a weekly independent podcast on international conflicts and concerns. |
Deceiving Authorship Detection Tools to Maintain Anonymity Through Writing Style & Current Trends in Adversarial Stylometry |
|
| 16:15 | |||
| 16:30 | |||
| 16:45 | |||
| 17:00 | |||
| 17:15 | |||
| 17:30 | |||
| 17:45 | |||
| 18:00 | |||
| 18:15 | |||
| 18:30 |
Implementation of MITM Attack on HDCP-Secured Links A non-copyright circumventing application of the HDCP master key |
Firmware Modification Attacks and the Rise of Printer Malware |
|
| 18:45 | |||
| 19:00 | |||
| 19:15 | |||
| 19:30 | |||
| 19:45 | |||
| 20:00 | |||
| 20:15 | |||
| 20:30 |
The future of cryptology: which 3 letters algorithm(s) could be our Titanic? |
||
| 20:45 | |||
| 21:00 | |||
| 21:15 | |||
| 21:30 | |||
| 21:45 | |||
| 22:00 | |||
| 22:15 | |||
| 22:30 | |||
| 22:45 | |||
| 23:00 | |||
| 23:15 | |||
| 23:30 | |||
| 23:45 |