Guest User

Untitled

a guest
Jan 11th, 2018
203
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 7.79 KB | None | 0 0
  1. Date: Wed Jan 10 2018 23:39:50 GMT+0100 (CET)
  2.  
  3. 1. Jahresrückblick des CCC 2017 (28139)
  4. 2. Security Nightmares 0x12 (26033)
  5. 3. Console Security - Switch (23664)
  6. 4. Social Bots, Fake News und Filterblasen (19866)
  7. 5. Schreibtisch-Hooligans (19763)
  8. 6. ASLR on the line (19482)
  9. 7. Methodisch inkorrekt! (17809)
  10. 8. Dude, you broke the Future! (17753)
  11. 9. Die Lauschprogramme der Geheimdienste (16569)
  12. 10. Die fabelhafte Welt des Mobilebankings (15937)
  13. 11. QualityLand (15735)
  14. 12. Hacker Jeopardy (15568)
  15. 13. Antipatterns und Missverständnisse in der Softwareentwicklung (14132)
  16. 14. Ladeinfrastruktur für Elektroautos: Ausbau statt Sicherheit (14052)
  17. 15. All Computers Are Beschlagnahmt (11614)
  18. 16. Trügerische Sicherheit (11517)
  19. 17. Tiger, Drucker und ein Mahnmal (10158)
  20. 18. Relativitätstheorie für blutige Anfänger (8739)
  21. 19. Beeinflussung durch Künstliche Intelligenz (7310)
  22. 20. Der netzpolitische Wetterbericht (7061)
  23. 21. The Ultimate Apollo Guidance Computer Talk (6709)
  24. 22. Nougatbytes 11₂ (6170)
  25. 23. Der PC-Wahl-Hack (6011)
  26. 24. Eröffnung: tuwat (5584)
  27. 25. SCADA - Gateway to (s)hell (5323)
  28. 26. Die Sprache der Überwacher (5003)
  29. 27. Mietshäusersyndikat: den Immobilienmarkt hacken (4470)
  30. 28. Es sind die kleinen Dinge im Leben II (3611)
  31. 29. Spy vs. Spy: A Modern Study Of Microphone Bugs Operation And Detection (3582)
  32. 30. How to drift with any car (3535)
  33. 31. Uncovering British spies’ web of sockpuppet social media personas (3405)
  34. 32. Public FPGA based DMA Attacking (3368)
  35. 33. Everything you want to know about x86 microcode, but might have been afraid to ask (3117)
  36. 34. Gamified Control? (3070)
  37. 35. How risky is the software you use? (2899)
  38. 36. Deep Learning Blindspots (2859)
  39. 37. hacking disaster (2822)
  40. 38. 0en & 1en auf dem Acker (2803)
  41. 39. Abschluss (2801)
  42. 40. Bildung auf dem Weg ins Neuland (2789)
  43. 41. Inside Intel Management Engine (2569)
  44. 42. Unleash your smart-home devices: Vacuum Cleaning Robot Hacking (2537)
  45. 43. Internet of Fails (2536)
  46. 44. Resilienced Kryptographie (2479)
  47. 45. The Snowden Refugees under Surveillance in Hong Kong (2405)
  48. 46. Infrastructure Review (2383)
  49. 47. Holography of Wi-Fi radiation (2326)
  50. 48. Ein Festival der Demokratie (2283)
  51. 49. Science is broken (2200)
  52. 50. Protecting Your Privacy at the Border (2157)
  53. 51. Demystifying Network Cards (2135)
  54. 52. A hacker's guide to Climate Change - What do we know and how do we know it? (2131)
  55. 53. Lobby-Schlacht um die ePrivacy-Verordnung (2104)
  56. 54. cryptocurrencies, smart contracts, etc.: revolutionary tech? (2027)
  57. 55. eMMC hacking, or: how I fixed long-dead Galaxy S3 phones (1940)
  58. 56. Decoding Contactless (Card) Payments (1871)
  59. 57. Free Electron Lasers (1850)
  60. 58. Taxation (1831)
  61. 59. Intel ME: Myths and reality (1797)
  62. 60. Forensic Architecture (1713)
  63. 61. Treibhausgasemissionen einschätzen (1651)
  64. 62. Die göttliche Informatik / The divine Computer Science (1524)
  65. 63. Running GSM mobile phone on SDR (1523)
  66. 64. DPRK Consumer Technology (1483)
  67. 65. Tightening the Net in Iran (1475)
  68. 66. Financial surveillance (1472)
  69. 67. Digitale Bildung in der Schule (1458)
  70. 68. MQA - A clever stealth DRM-Trojan (1434)
  71. 69. Internet censorship in the Catalan referendum (1343)
  72. 70. Access To Bodies (1338)
  73. 71. Are all BSDs created equally? (1275)
  74. 72. BBSs and early Internet access in the 1990ies (1221)
  75. 73. Privacy Shield - Lipstick on a Pig? (1204)
  76. 74. Schnaps Hacking (1194)
  77. 75. 1-day exploit development for Cisco IOS (1170)
  78. 76. KRACKing WPA2 by Forcing Nonce Reuse (1157)
  79. 77. UPSat - the first open source satellite (1120)
  80. 78. How Alice and Bob meet if they don't like onions (1072)
  81. 79. Reverse engineering FPGAs (1002)
  82. 80. The Internet in Cuba: A Story of Community Resilience (976)
  83. 81. Deconstructing a Socialist Lawnmower (970)
  84. 82. library operating systems (965)
  85. 83. LatticeHacks (942)
  86. 84. Briar (921)
  87. 85. Mobile Data Interception from the Interconnection Link (895)
  88. 86. Lets break modern binary code obfuscation (884)
  89. 87. Don't stop 'til you feel it (859)
  90. 88. Doping your Fitbit (844)
  91. 89. The making of a chip (830)
  92. 90. Social Cooling - big data’s unintended side effect (822)
  93. 91. Ecstasy 10x yellow Twitter 120mg Mdma (807)
  94. 92. Lightning Talks Day 4 (802)
  95. 93. Robot Music (793)
  96. 94. Watching the changing Earth (772)
  97. 95. Drones of Power: Airborne Wind Energy (767)
  98. 96. Home Distilling (748)
  99. 97. Type confusion: discovery, abuse, and protection (741)
  100. 98. Italy's surveillance toolbox (725)
  101. 99. Designing PCBs with code (719)
  102. 100. SatNOGS: Crowd-sourced satellite operations (717)
  103. 101. May contain DTraces of FreeBSD (694)
  104. 102. Open Source Estrogen (693)
  105. 103. Pointing Fingers at 'The Media' (685)
  106. 104. WHWP (682)
  107. 105. Coming Soon: Machine-Checked Mathematical Proofs in Everyday Software and Hardware Developme (665)
  108. 106. Humans as software extensions (663)
  109. 107. Extended DNA Analysis (648)
  110. 108. Growing Up Software Development (621)
  111. 109. Bringing Linux back to server boot ROMs with NERF and Heads (615)
  112. 110. Lightning Talks Day 3 (609)
  113. 111. Tracking Transience (606)
  114. 112. openPower - the current state of commercial openness in CPU development (605)
  115. 113. Opening Closed Systems with GlitchKit (585)
  116. 114. Squeezing a key through a carry bit (582)
  117. 115. Saving the World with Space Solar Power (581)
  118. 116. The Work of Art in the Age of Digital Assassination (580)
  119. 117. Low Cost Non-Invasive Biomedical Imaging (574)
  120. 118. Lightning Talks Day 2 (574)
  121. 119. Fuck Dutch mass-surveillance: let's have a referendum! (570)
  122. 120. BootStomp: On the Security of Bootloaders in Mobile Devices (559)
  123. 121. Uncertain Concern (554)
  124. 122. Electroedibles (549)
  125. 123. Hardening Open Source Development (544)
  126. 124. TrustZone is not enough (522)
  127. 125. iOS kernel exploitation archaeology (507)
  128. 126. WTFrance (506)
  129. 127. We should share our secrets (481)
  130. 128. avatar² (467)
  131. 129. Electromagnetic Threats for Information Security (452)
  132. 130. End-to-end formal ISA verification of RISC-V processors with riscv-formal (445)
  133. 131. Netzpolitik in der Schweiz (438)
  134. 132. Inside Android’s SafetyNet Attestation: Attack and Defense (399)
  135. 133. Simulating the future of the global agro-food system (398)
  136. 134. Microarchitectural Attacks on Trusted Execution Environments (398)
  137. 135. Policing in the age of data exploitation (397)
  138. 136. Uncovering vulnerabilities in Hoermann BiSecur (389)
  139. 137. The Noise Protocol Framework (389)
  140. 138. Catch me if you can: Internet Activism in Saudi Arabia (387)
  141. 139. Implementing an LLVM based Dynamic Binary Instrumentation framework (387)
  142. 140. Defeating (Not)Petya's Cryptography (381)
  143. 141. Taking a scalpel to QNX (369)
  144. 142. Blinkenrocket! (368)
  145. 143. How can you trust formally verified software? (356)
  146. 144. Modern key distribution with ClaimChain (338)
  147. 145. Net Neutraliy Enforcement in the EU (336)
  148. 146. Vintage Computing for Trusted Radiation Measurements and a World Free of Nuclear Weapons (318)
  149. 147. Ensuring Climate Data Remains Public (313)
  150. 148. Organisational Structures for Sustainable Free Software Development (297)
  151. 149. Think big or care for yourself (296)
  152. 150. Regulating Autonomous Weapons (287)
  153. 151. Making Experts Makers and Makers Experts (278)
  154. 152. Afro TECH (273)
  155. 153. BGP and the Rule of Custom (270)
  156. 154. “Nabovarme” opensource heating infrastructure in Christiania (261)
  157. 155. OONI: Let's Fight Internet Censorship, Together! (250)
  158. 156. Why Do We Anthropomorphize Computers?... (244)
  159. 157. Practical Mix Network Design (244)
  160. 158. institutions for Resolution Disputes (243)
  161. 159. On the Prospects and Challenges of Weather and Climate Modeling at Convection-Resolving Reso (235)
  162. 160. International Image Interoperability Framework (IIIF) – Kulturinstitutionen schaffen interop (209)
  163. 161. History and implications of DRM (208)
  164. 162. Visceral Systems (202)
  165. 163. The seizure of the Iuventa (165)
  166. 164. Zamir Transnational Network und Zagreb Dairy (163)
  167. 165. Algorithmic science evaluation and power structure: the discourse on strategic citation and 'citation cartels' (155)
  168. 166. Closing the loop: Reconnecting social-technologial dynamics to Earth System science (143)
Add Comment
Please, Sign In to add comment