FactHacks
RSA Factorization in the Real World RSA is the dominant public-key cryptosystem on the Internet. This talk will explain the state of the art in techniques for the attacker to […]
Lightning Talks 1
5 Minutes of Fame Persons: Nick Farr
Lightning Talks 2
5 Minutes of Fame Persons: Nick Farr
Lightning Talks 3
5 Minutes of Fame Persons: Nick Farr
Care & Feeding of Weird Machines
The Executable and Linkable Format (ELF) is omnipresent; related OS and library code is run whenever processes are set up and serviced (e.g., dynamically linked). The loader is the stage […]
The Future of Protocol Reversing
Mapping your Enemy Botnet with Netzob Have you ever been staring for nights at binary or hexadecimal data flows extracted from an USB channel? Don’t you remember yourself searching for […]
The Grand EU Data Protection Reform
The Latest Battle Report by Some Key Actors from Brussels The current European data protection directive is from 1995, which was when the internet had not hit Brussels’ decision-makers yet. […]
The Tor Software Ecosystem
At the very beginning, Tor was just a socks proxy that protected the origin and/or destination of your TCP flows. Now the broader Tor ecosystem includes a diverse set of […]
Long Live the Protocoletariat!
We’re winning! The future looks like network politics! Wait, what the hell are network politics and how do they work? Is that like the Pirate Party, or the IETF, or […]
Writing a Thumbdrive from Scratch
Prototyping Active Disk Antiforensics This action-packed lecture presents the inner workings of the author’s from-scratch implementation of a USB Mass Storage disk in user-land Python, along with some embarrassing bugs […]