28C3 - Version 0.3

28th Chaos Communication Congress
Behind Enemy Lines

Schedule Day 3

Saal 1 Saal 2 Saal 3
Saal 1 Saal 2 Saal 3
11:30

Taking control over the Tor network

11:45
12:00
12:15
12:30

KinectFusion

Real-time 3D Reconstruction and Interaction Using a Moving Depth Camera

12:45

Lightning Talks Day 3

Pecha Kucha Round!

13:00
13:15

Security Log Visualization with a Correlation Engine

What's inside your network?

13:30
13:45
14:00

Bitcoin - An Analysis

Frag den Staat

Praktische Informationsfreiheit

14:15
14:30

TRESOR: Festplatten sicher verschlüsseln

14:45
15:00
15:15
15:30
15:45
16:00

7 years, 400+ podcasts, and a whole lot of Frequent Flyer Miles

Lessons learned from producing a weekly independent podcast on international conflicts and concerns.

Deceiving Authorship Detection

Tools to Maintain Anonymity Through Writing Style & Current Trends in Adversarial Stylometry

16:15
16:30

Open source music: Tracking 2.0

16:45
17:00
17:15

Cellular protocol stacks for Internet

GPRS, EDGE, UMTS, HSPA demystified

The best of The oXcars

the greatest free/Libre culture show of all times

Electronic money: The road to Bitcoin and a glimpse forward

How the e-money systems can be made better

17:30
17:45
18:00
18:15
18:30

Implementation of MITM Attack on HDCP-Secured Links

A non-copyright circumventing application of the HDCP master key

Print Me If You Dare

Firmware Modification Attacks and the Rise of Printer Malware

Datenvieh oder Daten-Fee

Welchen Wert haben Trackingdaten?

18:45
19:00
19:15
19:30
19:45
20:00
20:15
20:30

The Hack will not be televised?

Hacker in Movies

The future of cryptology: which 3 letters algorithm(s) could be our Titanic?

RMS Olympic, RMS Titanic, HMHS Britannic vs Discrete Logarithm, Integer factorization, Conjectured hard problems

Introducing Osmo-GMR

Building a sniffer for the GMR satphones

20:45
21:00
21:15
21:30
21:45

New Ways I'm Going to Hack Your Web App

Towards a Single Secure European Cyberspace?

What the European Union wants. What the hackerdom can do..

Behind the scenes of a C64 demo

22:00
22:15
22:30
22:45
23:00

Fnord-Jahresrückblick

von Atomendlager bis Zensus

Sovereign Keys

A proposal for fixing attacks on CAs and DNSSEC

23:15
23:30
23:45