Writing a Thumbdrive from Scratch

Prototyping Active Disk Antiforensics This action-packed lecture presents the inner workings of the author’s from-scratch implementation of a USB Mass Storage disk in user-land Python, along with some embarrassing bugs […]
Defend your Freedoms Online

A Positive agenda against the next ACTA, SOPA, and such Over the years we learned impressively how to oppose bad legislation hurting our freedoms online. We are now facing an […]
Enemies of the State

Enemies of the State: What Happens When Telling the Truth about Secret US Government Power Becomes a Crime Blowing the Whistle on Spying, Lying & Illegalities in the Digital Era […]
FactHacks
RSA Factorization in the Real World RSA is the dominant public-key cryptosystem on the Internet. This talk will explain the state of the art in techniques for the attacker to […]
Lightning Talks 1

5 Minutes of Fame Persons: Nick Farr
Lightning Talks 2
5 Minutes of Fame Persons: Nick Farr
Lightning Talks 3
5 Minutes of Fame Persons: Nick Farr
Care & Feeding of Weird Machines

The Executable and Linkable Format (ELF) is omnipresent; related OS and library code is run whenever processes are set up and serviced (e.g., dynamically linked). The loader is the stage […]
The Future of Protocol Reversing
Mapping your Enemy Botnet with Netzob Have you ever been staring for nights at binary or hexadecimal data flows extracted from an USB channel? Don’t you remember yourself searching for […]
The Grand EU Data Protection Reform
The Latest Battle Report by Some Key Actors from Brussels The current European data protection directive is from 1995, which was when the internet had not hit Brussels’ decision-makers yet. […]