FactHacks

RSA Factorization in the Real World RSA is the dominant public-key cryptosystem on the Internet. This talk will explain the state of the art in techniques for the attacker to […]

Care & Feeding of Weird Machines

The Executable and Linkable Format (ELF) is omnipresent; related OS and library code is run whenever processes are set up and serviced (e.g., dynamically linked). The loader is the stage […]

The Future of Protocol Reversing

Mapping your Enemy Botnet with Netzob Have you ever been staring for nights at binary or hexadecimal data flows extracted from an USB channel? Don’t you remember yourself searching for […]

The Grand EU Data Protection Reform

The Latest Battle Report by Some Key Actors from Brussels The current European data protection directive is from 1995, which was when the internet had not hit Brussels’ decision-makers yet. […]

The Tor Software Ecosystem

At the very beginning, Tor was just a socks proxy that protected the origin and/or destination of your TCP flows. Now the broader Tor ecosystem includes a diverse set of […]

Long Live the Protocoletariat!

We’re winning! The future looks like network politics! Wait, what the hell are network politics and how do they work? Is that like the Pirate Party, or the IETF, or […]

Writing a Thumbdrive from Scratch

Prototyping Active Disk Antiforensics This action-packed lecture presents the inner workings of the author’s from-scratch implementation of a USB Mass Storage disk in user-land Python, along with some embarrassing bugs […]