Page Fault Liberation Army

A History of Creative x86 Virtual Memory Uses The x86 processors contain a surprising amount of built-in memory translation logic, which is driven by various data tables with intricate entry […]

We Are All Lawmakers

How to further transparency by law – the Hamburg example and beyond In the Free City of Hamburg, which is one of 16 German states, a coalition of hackers, activists […]

Hanussen’s Mindreading

Experiments of the Historical Psychic This is fun stuff for the late night program, not a serious talk: Is it possible to read sb. others mind? In the late 1920ies/early […]

Privacy and the Car of the Future

Considerations for the Connected Vehicle To date, remote vehicle communications have provided little in the way of privacy. Much information and misinformation has been spread on what the system is […]

What Accessibility Has to do with Security

Accessibility of digital content is a hugely misunderstood issue. Programmers and content developers tend to view it as a distraction or a special interest concern. Accessibility advocates fail to describe […]

Hash-Flooding DOS Reloaded

At 28C3, Klink and Waelde showed that a number of technologies (PHP, ASP.NET, Ruby, Java, Python, etc.) were vulnerable to the decade-old hash-flooding DoS attacks. The vulnerability was then often […]

Rambling Walk Through an EMV Transaction

With Visa and Mastercard pushing for EMV (http://www.emvco.com, aka “chip and pin”) rollout in the United States, the uptake of contactless payment and the use of mobile NFC wallets, the […]

Writing a Thumbdrive from Scratch

Prototyping Active Disk Antiforensics This action-packed lecture presents the inner workings of the author’s from-scratch implementation of a USB Mass Storage disk in user-land Python, along with some embarrassing bugs […]

How I Met Your Pointer

Hijacking Client Software for Fuzz and Profit An approach to the problem of fuzzing proprietary protocols will be shown, focusing on network protocols and native software. In the course of […]

Romantic Hackers

Keats, Wordsworth and Total Surveillance In 1791, the political reformer Jeremy Bentham theorized the Panopticon, whose design promised to allow a single Inspector to surveil (exercise “inspective force” over) large […]