Windows Memory Forensics

Aside from further development of traditional forensic techniques which involve post-mortem hard disk analysis, in the last couple of years the field of computer forensics has been marked by significant […]

SCADA Strangelove

How I Learned to Start Worrying and Love Nuclear Plants Modern civilization unconditionally depends on information systems. It is paradoxical but true that ICS/SCADA systems are the most insecure systems […]

Further Hacks on the Calypso Platform

OR How to Turn a Phone into a BTS The calypso baseband and its companion chips are used on the Motorola C123 among other and are now well known for […]

Securing the Campaign

Security and the 2012 US Presidential Election This talk will go into some of challenges, solutions, and stories from securing a campaign for the 2012 US presidential election. Persons: Ben […]

Hacking Cisco Phones

Just because you are paranoid doesn’t mean your phone isn’t listening to everything you say We discuss a set of 0-day kernel vulnerabilities in CNU (Cisco Native Unix), the operating […]

Setting Mobile Phones Free

An overview of a mobile telephony market and how a community-driven operator is born In The Netherlands, this year the community-driven mobile telco Limesco has started operations. We’re providing voice, […]

Hanussen’s Mindreading

Experiments of the Historical Psychic This is fun stuff for the late night program, not a serious talk: Is it possible to read sb. others mind? In the late 1920ies/early […]

Smartmeter

A Technological Overview of the German Roll-Out This talk will give an overview on the technology, the laws and the technical guidelines of the smartMeter roll-out in Germany. Persons: Derpeter

Hash-Flooding DOS Reloaded

At 28C3, Klink and Waelde showed that a number of technologies (PHP, ASP.NET, Ruby, Java, Python, etc.) were vulnerable to the decade-old hash-flooding DoS attacks. The vulnerability was then often […]

Ethics of Activist DDOS Actions

A Historical Analysis In the world of digital activism, distributed denial of service attacks present relatively low barriers to popular participation, have a high potential for attracting large numbers of […]