2.0 -//Pentabarf//Schedule #<Conference_release::Row:0x364a6f5f8e90>//EN HAR2009 Schedule Release #<Conference_release::Row:0x364a6f5f67f8> HAR2009 Schedule PUBLISH 45@HAR2009@pentabarf.org 45 advanced_mysql_exploitation Advanced MySQL Exploitation English en 20090813T210000 20090813T220000 01H00M00S Advanced MySQL Exploitation This talk focuses on how MySQL SQL injection vulnerabilites can be used to gain remote code execution on the LAMP and WAMP environments. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/45.en.html The Birthday Tent Muhaimin Dzulfakar PUBLISH 45@HAR2009@pentabarf.org 45 advanced_mysql_exploitation Advanced MySQL Exploitation englisch en 20090813T210000 20090813T220000 01H00M00S Advanced MySQL Exploitation This talk focuses on how MySQL SQL injection vulnerabilites can be used to gain remote code execution on the LAMP and WAMP environments. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/45.en.html The Birthday Tent Muhaimin Dzulfakar PUBLISH 104@HAR2009@pentabarf.org 104 surviving_the_corporate_world A hackers guide to surviving in the corporate world englisch en 20090814T120000 20090814T130000 01H00M00S A hackers guide to surviving in the corporate world A hacker’s guide to surviving in the corporate world. Large organizations, be it enterprises or government, are also large users of information technology. For people interested in the application of information technology, especially those interested in the risks that information technology brings, understanding the way large organizations work can therefore be very relevant. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/104.en.html Monty Hall Peter van Eijk PUBLISH 104@HAR2009@pentabarf.org 104 surviving_the_corporate_world A hackers guide to surviving in the corporate world English en 20090814T120000 20090814T130000 01H00M00S A hackers guide to surviving in the corporate world A hacker’s guide to surviving in the corporate world. Large organizations, be it enterprises or government, are also large users of information technology. For people interested in the application of information technology, especially those interested in the risks that information technology brings, understanding the way large organizations work can therefore be very relevant. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/104.en.html Monty Hall Peter van Eijk PUBLISH 186@HAR2009@pentabarf.org 186 airprobe Airprobe Monitoring GSM traffic with USRP English en 20090815T160000 20090815T170000 01H00M00S Airprobe- Monitoring GSM traffic with USRP The GNU Radio project, and the associated Universal Software Radio Peripheral hardware, has for the first time put access to wideband radio reception and digital signal processing into the hands of the average hacker. The airprobe project focuses on a software stack that provides GSM mobile phone reception and decoding. This talk gives a gentle introdoction into GSM, the airprobe software and its practical usage. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/186.en.html Monty Hall Harald Welte PUBLISH 186@HAR2009@pentabarf.org 186 airprobe Airprobe Monitoring GSM traffic with USRP englisch en 20090815T160000 20090815T170000 01H00M00S Airprobe- Monitoring GSM traffic with USRP The GNU Radio project, and the associated Universal Software Radio Peripheral hardware, has for the first time put access to wideband radio reception and digital signal processing into the hands of the average hacker. The airprobe project focuses on a software stack that provides GSM mobile phone reception and decoding. This talk gives a gentle introdoction into GSM, the airprobe software and its practical usage. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/186.en.html Monty Hall Harald Welte PUBLISH 41@HAR2009@pentabarf.org 41 attacking_backbone_tech All Your Packets Are Belong to Us Attacking Backbone Technologies englisch en 20090814T130000 20090814T140000 01H00M00S All Your Packets Are Belong to Us- Attacking Backbone Technologies The year 2008 has seen some severe attacks on infrastructure protocols (SNMP, DNS, BGP). We will continue down that road and discuss potential and real vulnerabilities in backbone technologies used in today's carrier space (e.g. MPLS, Carrier Ethernet, QinQ and the like). The talk includes a number of demos (like cracking BGP MD5 keys, redirecting MPLS traffic on a site level and some Carrier Ethernet stuff) all of which will be performed with a new tool kit made available at the con. It's about making the theoretical practical, once more! PUBLIC CONFIRMED Lecture https://har2009.org/program/events/41.en.html The Two Envelopes Tent Daniel Mende Simon Rich PUBLISH 41@HAR2009@pentabarf.org 41 attacking_backbone_tech All Your Packets Are Belong to Us Attacking Backbone Technologies English en 20090814T130000 20090814T140000 01H00M00S All Your Packets Are Belong to Us- Attacking Backbone Technologies The year 2008 has seen some severe attacks on infrastructure protocols (SNMP, DNS, BGP). We will continue down that road and discuss potential and real vulnerabilities in backbone technologies used in today's carrier space (e.g. MPLS, Carrier Ethernet, QinQ and the like). The talk includes a number of demos (like cracking BGP MD5 keys, redirecting MPLS traffic on a site level and some Carrier Ethernet stuff) all of which will be performed with a new tool kit made available at the con. It's about making the theoretical practical, once more! PUBLIC CONFIRMED Lecture https://har2009.org/program/events/41.en.html The Two Envelopes Tent Daniel Mende Simon Rich PUBLISH 15@HAR2009@pentabarf.org 15 analog_circuit_design Analog circuit design How to create analog electronic circuits English en 20090814T130000 20090814T140000 01H00M00S Analog circuit design- How to create analog electronic circuits Digital electronics is ubiquitous in our lives. While it is easy to design digital systems, it seems harder to create circuits amplifying or transforming analog signals. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/15.en.html The Birthday Tent Rüdiger Ranft PUBLISH 15@HAR2009@pentabarf.org 15 analog_circuit_design Analog circuit design How to create analog electronic circuits englisch en 20090814T130000 20090814T140000 01H00M00S Analog circuit design- How to create analog electronic circuits Digital electronics is ubiquitous in our lives. While it is easy to design digital systems, it seems harder to create circuits amplifying or transforming analog signals. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/15.en.html The Birthday Tent Rüdiger Ranft PUBLISH 122@HAR2009@pentabarf.org 122 An empirical study of division of labour in free software development the case of the FreeBSD project englisch en 20090816T120000 20090816T130000 01H00M00S An empirical study of division of labour in free software development- the case of the FreeBSD project For an overview of the presentation, see the slides attached. (The slides reflect the state of our research two months ago; but as the research is still in progress, the slides we intend to present at HAR will be further updated). PUBLIC CONFIRMED Lecture https://har2009.org/program/events/122.en.html The Two Envelopes Tent George Dafermos PUBLISH 122@HAR2009@pentabarf.org 122 An empirical study of division of labour in free software development the case of the FreeBSD project English en 20090816T120000 20090816T130000 01H00M00S An empirical study of division of labour in free software development- the case of the FreeBSD project For an overview of the presentation, see the slides attached. (The slides reflect the state of our research two months ago; but as the research is still in progress, the slides we intend to present at HAR will be further updated). PUBLIC CONFIRMED Lecture https://har2009.org/program/events/122.en.html The Two Envelopes Tent George Dafermos PUBLISH 82@HAR2009@pentabarf.org 82 anonymous_vs_scientology Anonymous Vs. Scientology a case study in 2.0 hacktivism & how it could help future projects englisch en 20090814T190000 20090814T200000 01H00M00S Anonymous Vs. Scientology- a case study in 2.0 hacktivism & how it could help future projects About Social organising via Web 2.0 PUBLIC CONFIRMED Lecture https://har2009.org/program/events/82.en.html Monty Hall Henk de Vries PUBLISH 82@HAR2009@pentabarf.org 82 anonymous_vs_scientology Anonymous Vs. Scientology a case study in 2.0 hacktivism & how it could help future projects English en 20090814T190000 20090814T200000 01H00M00S Anonymous Vs. Scientology- a case study in 2.0 hacktivism & how it could help future projects About Social organising via Web 2.0 PUBLIC CONFIRMED Lecture https://har2009.org/program/events/82.en.html Monty Hall Henk de Vries PUBLISH 49@HAR2009@pentabarf.org 49 anti_counterfeiting_agreement Anti-Counterfeiting Trade Agreement New legislation for a billion people, made behind closed doors englisch en 20090815T150000 20090815T160000 01H00M00S Anti-Counterfeiting Trade Agreement- New legislation for a billion people, made behind closed doors "Stringent intellectual property rules could hamper the spread of technology needed to fight climate change." Paul David, professor of economics at Stanford University, California "If Hollywood could order intellectual property laws for Christmas, what would they look like? This is pretty close." David Fewer, staff counsel at the Canadian Internet Policy and Public Interest Clinic, University of Ottawa, after looking at leaked ACTA documents. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/49.en.html The Two Envelopes Tent Ante Wessels PUBLISH 49@HAR2009@pentabarf.org 49 anti_counterfeiting_agreement Anti-Counterfeiting Trade Agreement New legislation for a billion people, made behind closed doors English en 20090815T150000 20090815T160000 01H00M00S Anti-Counterfeiting Trade Agreement- New legislation for a billion people, made behind closed doors "Stringent intellectual property rules could hamper the spread of technology needed to fight climate change." Paul David, professor of economics at Stanford University, California "If Hollywood could order intellectual property laws for Christmas, what would they look like? This is pretty close." David Fewer, staff counsel at the Canadian Internet Policy and Public Interest Clinic, University of Ottawa, after looking at leaked ACTA documents. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/49.en.html The Two Envelopes Tent Ante Wessels PUBLISH 211@HAR2009@pentabarf.org 211 A workshop on the ethics of piracy (debating the arguments in the earlier talk) English en 20090816T120000 20090816T130000 01H00M00S A workshop on the ethics of piracy- (debating the arguments in the earlier talk) Lots of people had questions, comments and counterarguments to the "Complex Ethics of Piracy" talk. Someone suggested we should have a Workshop to debate them further. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/211.en.html Bike-shed Red Peter Eckersley PUBLISH 211@HAR2009@pentabarf.org 211 A workshop on the ethics of piracy (debating the arguments in the earlier talk) englisch en 20090816T120000 20090816T130000 01H00M00S A workshop on the ethics of piracy- (debating the arguments in the earlier talk) Lots of people had questions, comments and counterarguments to the "Complex Ethics of Piracy" talk. Someone suggested we should have a Workshop to debate them further. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/211.en.html Bike-shed Red Peter Eckersley PUBLISH 130@HAR2009@pentabarf.org 130 beautifulism_delight Beautifulism & [de]light Next generation of BlinkenArea projects English en 20090813T160000 20090813T170000 01H00M00S Beautifulism & [de]light- Next generation of BlinkenArea projects After celebrating the 5th anniversary of the founding of the BlinkenArea last year, it is now time to start for the future of researching and operating flashlights. The new meme of beautifulism & [de]light will lead us to the next generation of BlinkenArea projects. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/130.en.html The Birthday Tent Juliane Pilster Stephan 'ST' Kambor PUBLISH 130@HAR2009@pentabarf.org 130 beautifulism_delight Beautifulism & [de]light Next generation of BlinkenArea projects englisch en 20090813T160000 20090813T170000 01H00M00S Beautifulism & [de]light- Next generation of BlinkenArea projects After celebrating the 5th anniversary of the founding of the BlinkenArea last year, it is now time to start for the future of researching and operating flashlights. The new meme of beautifulism & [de]light will lead us to the next generation of BlinkenArea projects. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/130.en.html The Birthday Tent Juliane Pilster Stephan 'ST' Kambor PUBLISH 181@HAR2009@pentabarf.org 181 overheid20 Becoming government 2.0 English en 20090815T120000 20090815T130000 01H00M00S Becoming government 2.0 Internet and web 2.0 are bringing a fundamental change to how society works and how organisations work. This means government will have to change as well. These changes will not only affect the relationship between citizens and government, but also the internal structure of governmental organizations and the way civil servants work. Quite a challenge. How is this change coming about? And what can be done to accelerate the process? What can you do? Davied van Berlo, founder of the Civil Servant Network (www.ambtenaar20.nl), will share his views and experiences. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/181.en.html The Two Envelopes Tent Davied van Berlo PUBLISH 181@HAR2009@pentabarf.org 181 overheid20 Becoming government 2.0 englisch en 20090815T120000 20090815T130000 01H00M00S Becoming government 2.0 Internet and web 2.0 are bringing a fundamental change to how society works and how organisations work. This means government will have to change as well. These changes will not only affect the relationship between citizens and government, but also the internal structure of governmental organizations and the way civil servants work. Quite a challenge. How is this change coming about? And what can be done to accelerate the process? What can you do? Davied van Berlo, founder of the Civil Servant Network (www.ambtenaar20.nl), will share his views and experiences. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/181.en.html The Two Envelopes Tent Davied van Berlo PUBLISH 200@HAR2009@pentabarf.org 200 yroworkshop2 Bits of Freedom online freedom activism workshop 20090815T150000 20090815T160000 01H00M00S Bits of Freedom online freedom activism workshop PUBLIC CONFIRMED Lecture https://har2009.org/program/events/200.en.html Bike-shed Green Ot van Daalen PUBLISH 200@HAR2009@pentabarf.org 200 yroworkshop2 Bits of Freedom online freedom activism workshop 20090815T150000 20090815T160000 01H00M00S Bits of Freedom online freedom activism workshop PUBLIC CONFIRMED Lecture https://har2009.org/program/events/200.en.html Bike-shed Green Ot van Daalen PUBLISH 199@HAR2009@pentabarf.org 199 yroworkshop1 Bits of Freedom privacy activism workshop englisch en 20090815T140000 20090815T150000 01H00M00S Bits of Freedom privacy activism workshop PUBLIC CONFIRMED Lecture https://har2009.org/program/events/199.en.html Bike-shed Green Ot van Daalen PUBLISH 199@HAR2009@pentabarf.org 199 yroworkshop1 Bits of Freedom privacy activism workshop English en 20090815T140000 20090815T150000 01H00M00S Bits of Freedom privacy activism workshop PUBLIC CONFIRMED Lecture https://har2009.org/program/events/199.en.html Bike-shed Green Ot van Daalen PUBLISH 131@HAR2009@pentabarf.org 131 blinkenmovie BlinkenArea - Movie Contest beautifulism & [de]light englisch en 20090813T200000 20090813T230000 03H00M00S BlinkenArea - Movie Contest- beautifulism & [de]light The BlinkenArea would like to organise a movie contest for HARCade (BlinkenArea project TroiCade, which is showcased somewhere at HAR area). Everybody can create movies shown on the project during the event by using a special software, provided on BlinkenArea website. A jury will be assembled to choose the best movie and to award a prize at the end of HAR. For further information have a look on https://wiki.blinkenarea.org/index.php/HAR2009 from time to time! PUBLIC CONFIRMED Lecture https://har2009.org/program/events/131.en.html HARcade (valkennest) Juliane Pilster Stephan 'ST' Kambor PUBLISH 131@HAR2009@pentabarf.org 131 blinkenmovie BlinkenArea - Movie Contest beautifulism & [de]light English en 20090813T200000 20090813T230000 03H00M00S BlinkenArea - Movie Contest- beautifulism & [de]light The BlinkenArea would like to organise a movie contest for HARCade (BlinkenArea project TroiCade, which is showcased somewhere at HAR area). Everybody can create movies shown on the project during the event by using a special software, provided on BlinkenArea website. A jury will be assembled to choose the best movie and to award a prize at the end of HAR. For further information have a look on https://wiki.blinkenarea.org/index.php/HAR2009 from time to time! PUBLIC CONFIRMED Lecture https://har2009.org/program/events/131.en.html HARcade (valkennest) Juliane Pilster Stephan 'ST' Kambor PUBLISH 10@HAR2009@pentabarf.org 10 blinkensisters BlinkenSisters Jump'n'Run Open Source Retro-Gaming English en 20090814T120000 20090814T130000 01H00M00S BlinkenSisters Jump'n'Run- Open Source Retro-Gaming There was a time when 2D Jump'n'Run games where state-of-the-art and you'd spend the whole weekend trying to get past the last boss monster. That time has long since gone... ...or has it? "BlinkenSisters - Hunt for the Lost Pixels" is an extensible open source Jump'n'Run game that brings back the 80's. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/10.en.html The Birthday Tent Rene "cavac" Schickbauer PUBLISH 10@HAR2009@pentabarf.org 10 blinkensisters BlinkenSisters Jump'n'Run Open Source Retro-Gaming englisch en 20090814T120000 20090814T130000 01H00M00S BlinkenSisters Jump'n'Run- Open Source Retro-Gaming There was a time when 2D Jump'n'Run games where state-of-the-art and you'd spend the whole weekend trying to get past the last boss monster. That time has long since gone... ...or has it? "BlinkenSisters - Hunt for the Lost Pixels" is an extensible open source Jump'n'Run game that brings back the 80's. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/10.en.html The Birthday Tent Rene "cavac" Schickbauer PUBLISH 135@HAR2009@pentabarf.org 135 breaking_hitag2 Breaking Hitag2 English en 20090815T120000 20090815T130000 01H00M00S Breaking Hitag2 Hitag2 is a low-frequency RFID system operating on a 120kHz using a proprietary 48-bit stream cipher which is only slightly harder to attack than the much-publicized Mifare Crypto-1 cipher. Hitag2 (with or without encryption) is mostly used for building access control or car immobilizers. The low operating frequency and low data rate (2, 4 or 8 kbit/s) makes building sniffers, replayers and emulators especially easy. The maximum frequency of the data signal is in the audio range, so a normal sound card can be used as an A/D and D/A converter, using a very cheap diode detector radio for reception and simple load modulation circuit for transmission. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/135.en.html Monty Hall Henryk Plötz Karsten Nohl PUBLISH 135@HAR2009@pentabarf.org 135 breaking_hitag2 Breaking Hitag2 englisch en 20090815T120000 20090815T130000 01H00M00S Breaking Hitag2 Hitag2 is a low-frequency RFID system operating on a 120kHz using a proprietary 48-bit stream cipher which is only slightly harder to attack than the much-publicized Mifare Crypto-1 cipher. Hitag2 (with or without encryption) is mostly used for building access control or car immobilizers. The low operating frequency and low data rate (2, 4 or 8 kbit/s) makes building sniffers, replayers and emulators especially easy. The maximum frequency of the data signal is in the audio range, so a normal sound card can be used as an A/D and D/A converter, using a very cheap diode detector radio for reception and simple load modulation circuit for transmission. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/135.en.html Monty Hall Henryk Plötz Karsten Nohl PUBLISH 92@HAR2009@pentabarf.org 92 hacking_contest Capture the flag hacking contest englisch en 20090813T130000 20090813T140000 01H00M00S Capture the flag - hacking contest In the talk we will give an introduction to CTF contests in IT security. Starting Friday, 10PM CEST, we will host a live CTF lasting 24 hours. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/92.en.html The Birthday Tent Hans-Christian Esperer mc.fly PUBLISH 92@HAR2009@pentabarf.org 92 hacking_contest Capture the flag hacking contest English en 20090813T130000 20090813T140000 01H00M00S Capture the flag - hacking contest In the talk we will give an introduction to CTF contests in IT security. Starting Friday, 10PM CEST, we will host a live CTF lasting 24 hours. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/92.en.html The Birthday Tent Hans-Christian Esperer mc.fly PUBLISH 36@HAR2009@pentabarf.org 36 classic_mistakes Classic Mistakes Mistakes made with the Mifare Classic englisch en 20090814T130000 20090814T140000 01H00M00S Classic Mistakes- Mistakes made with the Mifare Classic This lecture gives a broad overview of the vulnerabilities that exists in MIFARE Classic products and the way they are used by system integrators. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/36.en.html Monty Hall Roel Verdult PUBLISH 36@HAR2009@pentabarf.org 36 classic_mistakes Classic Mistakes Mistakes made with the Mifare Classic English en 20090814T130000 20090814T140000 01H00M00S Classic Mistakes- Mistakes made with the Mifare Classic This lecture gives a broad overview of the vulnerabilities that exists in MIFARE Classic products and the way they are used by system integrators. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/36.en.html Monty Hall Roel Verdult PUBLISH 147@HAR2009@pentabarf.org 147 har_closing Closing Ceremony So Long, and Thanks for All the ... englisch en 20090816T160000 20090816T170000 01H00M00S Closing Ceremony- So Long, and Thanks for All the ... Closing Ceremony PUBLIC CONFIRMED Lecture https://har2009.org/program/events/147.en.html Monty Hall Aldert Hazenberg PUBLISH 147@HAR2009@pentabarf.org 147 har_closing Closing Ceremony So Long, and Thanks for All the ... English en 20090816T160000 20090816T170000 01H00M00S Closing Ceremony- So Long, and Thanks for All the ... Closing Ceremony PUBLIC CONFIRMED Lecture https://har2009.org/program/events/147.en.html Monty Hall Aldert Hazenberg PUBLISH 210@HAR2009@pentabarf.org 210 coreboot Beyond the final frontier 20090813T140000 20090813T150000 01H00M00S coreboot- Beyond the final frontier PUBLIC CONFIRMED Lecture https://har2009.org/program/events/210.en.html Monty Hall Peter Stuge PUBLISH 210@HAR2009@pentabarf.org 210 coreboot Beyond the final frontier 20090813T140000 20090813T150000 01H00M00S coreboot- Beyond the final frontier PUBLIC CONFIRMED Lecture https://har2009.org/program/events/210.en.html Monty Hall Peter Stuge PUBLISH 57@HAR2009@pentabarf.org 57 countering_malware_analysis Countering behavior based malware analysis englisch en 20090813T200000 20090813T210000 01H00M00S Countering behavior based malware analysis This paper and the talk will deal with behavior-based malware analysis, it's orgins and some general models. The paper will describe how malware detection focussing on semantics works, dicuss some simple schemes and the overall weaknesses of behavior-based malware detection. The paper and talk will be rather theoretical in nature, although practical examples and explanations are given. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/57.en.html The Two Envelopes Tent Nomenumbra PUBLISH 57@HAR2009@pentabarf.org 57 countering_malware_analysis Countering behavior based malware analysis English en 20090813T200000 20090813T210000 01H00M00S Countering behavior based malware analysis This paper and the talk will deal with behavior-based malware analysis, it's orgins and some general models. The paper will describe how malware detection focussing on semantics works, dicuss some simple schemes and the overall weaknesses of behavior-based malware detection. The paper and talk will be rather theoretical in nature, although practical examples and explanations are given. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/57.en.html The Two Envelopes Tent Nomenumbra PUBLISH 187@HAR2009@pentabarf.org 187 cracking_a5_crypto Cracking A5 GSM encryption State of affairs englisch en 20090815T170000 20090815T180000 01H00M00S Cracking A5 GSM encryption- State of affairs Project web site: http://reflextor.com/trac/a51 PUBLIC CONFIRMED Lecture https://har2009.org/program/events/187.en.html Monty Hall Karsten Nohl PUBLISH 187@HAR2009@pentabarf.org 187 cracking_a5_crypto Cracking A5 GSM encryption State of affairs English en 20090815T170000 20090815T180000 01H00M00S Cracking A5 GSM encryption- State of affairs Project web site: http://reflextor.com/trac/a51 PUBLIC CONFIRMED Lecture https://har2009.org/program/events/187.en.html Monty Hall Karsten Nohl PUBLISH 78@HAR2009@pentabarf.org 78 Cracking Internet The urgency of DNSSEC English en 20090815T140000 20090815T150000 01H00M00S Cracking Internet- The urgency of DNSSEC This workshop will introduce the problems with DNS that jeapardise the Internet as a whole. We will begin with a general discussion, and argue that the only real solution that is ready now is DNSSEC. We will continue with more detailed discussions of the Kaminsky attack, and explain how to attack the machines that we prepared for attack during HAR2009. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/78.en.html Monty Hall Rick van Rein PUBLISH 78@HAR2009@pentabarf.org 78 Cracking Internet The urgency of DNSSEC englisch en 20090815T140000 20090815T150000 01H00M00S Cracking Internet- The urgency of DNSSEC This workshop will introduce the problems with DNS that jeapardise the Internet as a whole. We will begin with a general discussion, and argue that the only real solution that is ready now is DNSSEC. We will continue with more detailed discussions of the Kaminsky attack, and explain how to attack the machines that we prepared for attack during HAR2009. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/78.en.html Monty Hall Rick van Rein PUBLISH 149@HAR2009@pentabarf.org 149 deep_silicon_analysis Deep Silicon Analysis englisch en 20090815T210000 20090815T220000 01H00M00S Deep Silicon Analysis Microchips have long been objects of fascination for hackers and geeks. The manuals of processors and microcontrollers are well studied as are their assembly languages. Now, what if you could dig deeper into a chip and fully understand its hardware implementation? PUBLIC CONFIRMED Lecture https://har2009.org/program/events/149.en.html The Two Envelopes Tent Karsten Nohl PUBLISH 149@HAR2009@pentabarf.org 149 deep_silicon_analysis Deep Silicon Analysis English en 20090815T210000 20090815T220000 01H00M00S Deep Silicon Analysis Microchips have long been objects of fascination for hackers and geeks. The manuals of processors and microcontrollers are well studied as are their assembly languages. Now, what if you could dig deeper into a chip and fully understand its hardware implementation? PUBLIC CONFIRMED Lecture https://har2009.org/program/events/149.en.html The Two Envelopes Tent Karsten Nohl PUBLISH 136@HAR2009@pentabarf.org 136 building_a_cyclotron Design and Build a 2 MeV Cyclotron englisch en 20090813T170000 20090813T180000 01H00M00S Design and Build a 2 MeV Cyclotron Cyclotrons efficiently generate beams of charged particles at high energies, typically on the order of MeV. These charged particle beams have an immense range of applications in many different scientific and engineering fields--from biological engineering, to material science, to simple particle physics experiments. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/136.en.html The Birthday Tent Leslie Dewan PUBLISH 136@HAR2009@pentabarf.org 136 building_a_cyclotron Design and Build a 2 MeV Cyclotron English en 20090813T170000 20090813T180000 01H00M00S Design and Build a 2 MeV Cyclotron Cyclotrons efficiently generate beams of charged particles at high energies, typically on the order of MeV. These charged particle beams have an immense range of applications in many different scientific and engineering fields--from biological engineering, to material science, to simple particle physics experiments. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/136.en.html The Birthday Tent Leslie Dewan PUBLISH 37@HAR2009@pentabarf.org 37 dev_embedded_devices Developing embedded devices using opensource tools: application to handheld game consoles English en 20090814T140000 20090814T150000 01H00M00S Developing embedded devices using opensource tools: application to handheld game consoles Embedded device programming using opensource tools. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/37.en.html The Birthday Tent jmfriedt PUBLISH 37@HAR2009@pentabarf.org 37 dev_embedded_devices Developing embedded devices using opensource tools: application to handheld game consoles englisch en 20090814T140000 20090814T150000 01H00M00S Developing embedded devices using opensource tools: application to handheld game consoles Embedded device programming using opensource tools. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/37.en.html The Birthday Tent jmfriedt PUBLISH 206@HAR2009@pentabarf.org 206 Distributed social networking englisch en 20090813T150000 20090813T170000 02H00M00S Distributed social networking PUBLIC CONFIRMED Lecture https://har2009.org/program/events/206.en.html Bike-shed Red Henry Story PUBLISH 206@HAR2009@pentabarf.org 206 Distributed social networking English en 20090813T150000 20090813T170000 02H00M00S Distributed social networking PUBLIC CONFIRMED Lecture https://har2009.org/program/events/206.en.html Bike-shed Red Henry Story PUBLISH 42@HAR2009@pentabarf.org 42 DNS Security In The Broadest Sense Why DNS Security does and does not matter englisch en 20090814T140000 20090814T150000 01H00M00S DNS Security In The Broadest Sense- Why DNS Security does and does not matter The Domain Name System underlies almost any transaction on the internet, from sending email to visiting a web page. Its security and reliability are therefore of paramount importance. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/42.en.html The Two Envelopes Tent Bert Hubert PUBLISH 42@HAR2009@pentabarf.org 42 DNS Security In The Broadest Sense Why DNS Security does and does not matter English en 20090814T140000 20090814T150000 01H00M00S DNS Security In The Broadest Sense- Why DNS Security does and does not matter The Domain Name System underlies almost any transaction on the internet, from sending email to visiting a web page. Its security and reliability are therefore of paramount importance. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/42.en.html The Two Envelopes Tent Bert Hubert PUBLISH 198@HAR2009@pentabarf.org 198 EDRi meet & greet/workshop Workshop for EDRi-members and related activist groups 20090814T180000 20090814T190000 01H00M00S EDRi meet & greet/workshop- Workshop for EDRi-members and related activist groups Almost all European countries have one or more activist groups concerned with civil rights in a digital society. EDRi is a European platform for such organisations and has members in virtually all EU member states and the EFTA countries. A lot of the people involved hardly ever meet in person. Vrijschrift/Scriptum Libre would like to take advantage of the fact that quite a few Hacktivists will attend HAR2009 anyway and has found the HAR2009 organisation willing to provide room for just meeting each other as well as discussing the current state of European civil rights online and offline. More specific: what pieces of upcoming EU regulation warrant action by the various groups. This meeting is intended as a mostly free form event for those interested in this subject. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/198.en.html Bike-shed Red PUBLISH 198@HAR2009@pentabarf.org 198 EDRi meet & greet/workshop Workshop for EDRi-members and related activist groups 20090814T180000 20090814T190000 01H00M00S EDRi meet & greet/workshop- Workshop for EDRi-members and related activist groups Almost all European countries have one or more activist groups concerned with civil rights in a digital society. EDRi is a European platform for such organisations and has members in virtually all EU member states and the EFTA countries. A lot of the people involved hardly ever meet in person. Vrijschrift/Scriptum Libre would like to take advantage of the fact that quite a few Hacktivists will attend HAR2009 anyway and has found the HAR2009 organisation willing to provide room for just meeting each other as well as discussing the current state of European civil rights online and offline. More specific: what pieces of upcoming EU regulation warrant action by the various groups. This meeting is intended as a mostly free form event for those interested in this subject. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/198.en.html Bike-shed Red PUBLISH 60@HAR2009@pentabarf.org 60 elec_engineering Electrical enginering with free/libre open source software gEDA, PCB, Emdebian, positive vs negative vs proprietary vs floss standoff English en 20090813T150000 20090813T160000 01H00M00S Electrical enginering with free/libre open source software- gEDA, PCB, Emdebian, positive vs negative vs proprietary vs floss standoff In this talk Jelle is going to talk about hardware development with complete FLOSS based development tools. He is going to show the OpenARM Single Board Computer Project (SBC) and will explains some things about the Emdebbian project and the need of TDEBs. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/60.en.html Monty Hall Jelle de Jong PUBLISH 60@HAR2009@pentabarf.org 60 elec_engineering Electrical enginering with free/libre open source software gEDA, PCB, Emdebian, positive vs negative vs proprietary vs floss standoff englisch en 20090813T150000 20090813T160000 01H00M00S Electrical enginering with free/libre open source software- gEDA, PCB, Emdebian, positive vs negative vs proprietary vs floss standoff In this talk Jelle is going to talk about hardware development with complete FLOSS based development tools. He is going to show the OpenARM Single Board Computer Project (SBC) and will explains some things about the Emdebbian project and the need of TDEBs. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/60.en.html Monty Hall Jelle de Jong PUBLISH 165@HAR2009@pentabarf.org 165 Exploiting Native Client Google Native Client Security in a Brave New World English en 20090815T110000 20090815T120000 01H00M00S Exploiting Native Client- Google Native Client Security in a Brave New World In a world buzzing full with concepts of mobile-cloud-virtualized-software-as-a-service-2.0 technology, the science of actually delivering applications over the web has never been more relevant. Enter Google Native Client, a radical new player hoping to match up to the collective powerhouse of Microsoft ActiveX, Sun Java and Adobe Flash. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/165.en.html The Two Envelopes Tent Ben Hawkes PUBLISH 165@HAR2009@pentabarf.org 165 Exploiting Native Client Google Native Client Security in a Brave New World englisch en 20090815T110000 20090815T120000 01H00M00S Exploiting Native Client- Google Native Client Security in a Brave New World In a world buzzing full with concepts of mobile-cloud-virtualized-software-as-a-service-2.0 technology, the science of actually delivering applications over the web has never been more relevant. Enter Google Native Client, a radical new player hoping to match up to the collective powerhouse of Microsoft ActiveX, Sun Java and Adobe Flash. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/165.en.html The Two Envelopes Tent Ben Hawkes PUBLISH 166@HAR2009@pentabarf.org 166 eyeborg Eyeborg project English en 20090813T150000 20090813T160000 01H00M00S Eyeborg project Take a one eyed film maker, an unemployed engineer, and a vision for something that's never been done before and you have yourself the EyeBorg Project. Rob Spence and Kosta Grammatis are trying to make history by embedding a video camera and a transmitter in a prosthetic eye. That eye is going in Robs eye socket, and will record the world from a perspective that's never been seen before. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/166.en.html The Two Envelopes Tent Kosta Grammatis PUBLISH 166@HAR2009@pentabarf.org 166 eyeborg Eyeborg project englisch en 20090813T150000 20090813T160000 01H00M00S Eyeborg project Take a one eyed film maker, an unemployed engineer, and a vision for something that's never been done before and you have yourself the EyeBorg Project. Rob Spence and Kosta Grammatis are trying to make history by embedding a video camera and a transmitter in a prosthetic eye. That eye is going in Robs eye socket, and will record the world from a perspective that's never been seen before. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/166.en.html The Two Envelopes Tent Kosta Grammatis PUBLISH 124@HAR2009@pentabarf.org 124 how_to_get_v6 First woman on native IPv6, and other tales How to get IPv6 English en 20090814T160000 20090814T170000 01H00M00S First woman on native IPv6, and other tales- How to get IPv6 "All this, and native IPv6" Proud to be the first female XS4ALL customer using IPv6. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/124.en.html The Birthday Tent BECHA PUBLISH 124@HAR2009@pentabarf.org 124 how_to_get_v6 First woman on native IPv6, and other tales How to get IPv6 englisch en 20090814T160000 20090814T170000 01H00M00S First woman on native IPv6, and other tales- How to get IPv6 "All this, and native IPv6" Proud to be the first female XS4ALL customer using IPv6. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/124.en.html The Birthday Tent BECHA PUBLISH 74@HAR2009@pentabarf.org 74 fishphucker Flipping the Phishing Con Game - Design and Implementation of FishPhucker Anti-Phishing Extension English en 20090813T150000 20090813T160000 01H00M00S Flipping the Phishing Con Game - Design and Implementation of FishPhucker- Anti-Phishing Extension Numerous counter-measures against phishing have been evaluated in recent years. Users have been educated; authenticity in Bank websites was improved and out-of-band authentication methods were established, but phishing remains a problem. This work focuses on a new method which attempts to turn the tables on Phishers. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/74.en.html The Birthday Tent Dominik Birk PUBLISH 74@HAR2009@pentabarf.org 74 fishphucker Flipping the Phishing Con Game - Design and Implementation of FishPhucker Anti-Phishing Extension englisch en 20090813T150000 20090813T160000 01H00M00S Flipping the Phishing Con Game - Design and Implementation of FishPhucker- Anti-Phishing Extension Numerous counter-measures against phishing have been evaluated in recent years. Users have been educated; authenticity in Bank websites was improved and out-of-band authentication methods were established, but phishing remains a problem. This work focuses on a new method which attempts to turn the tables on Phishers. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/74.en.html The Birthday Tent Dominik Birk PUBLISH 203@HAR2009@pentabarf.org 203 workshop_restful_auth FOAF+SSL: RESTful authentication for the Social Web English en 20090814T160000 20090814T180000 02H00M00S FOAF+SSL: RESTful authentication for the Social Web PUBLIC CONFIRMED Lecture https://har2009.org/program/events/203.en.html Bike-shed Green Henry Story PUBLISH 203@HAR2009@pentabarf.org 203 workshop_restful_auth FOAF+SSL: RESTful authentication for the Social Web englisch en 20090814T160000 20090814T180000 02H00M00S FOAF+SSL: RESTful authentication for the Social Web PUBLIC CONFIRMED Lecture https://har2009.org/program/events/203.en.html Bike-shed Green Henry Story PUBLISH 65@HAR2009@pentabarf.org 65 Foundry CAM hacking Dutch nl 20090815T130000 20090815T140000 01H00M00S Foundry CAM hacking De presentatie zal de internals (CAM) tonen van een redelijk standaard chassis gebaseerde switch/router (Foundry), demonstreren dat het (alhoewel unsupported) mogelijk is packet headers te dumpen middels een aantal ongedocumenteerde commando's, en proberen het hackersgevoel te delen dit alles uit te vinden. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/65.en.html The Birthday Tent Vincent Bourgonjen PUBLISH 65@HAR2009@pentabarf.org 65 Foundry CAM hacking niederländisch nl 20090815T130000 20090815T140000 01H00M00S Foundry CAM hacking De presentatie zal de internals (CAM) tonen van een redelijk standaard chassis gebaseerde switch/router (Foundry), demonstreren dat het (alhoewel unsupported) mogelijk is packet headers te dumpen middels een aantal ongedocumenteerde commando's, en proberen het hackersgevoel te delen dit alles uit te vinden. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/65.en.html The Birthday Tent Vincent Bourgonjen PUBLISH 152@HAR2009@pentabarf.org 152 futureshock Futureshock, don't panic! how do we deal with accelerating change? englisch en 20090814T210000 20090814T220000 01H00M00S Futureshock, don't panic!- how do we deal with accelerating change? A much improved and updated version of my 2005 What The Hack talk about the future of information, bio and nanotechologies, their convergence and it's consequences. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/152.en.html Monty Hall Arjen Kamphuis PUBLISH 152@HAR2009@pentabarf.org 152 futureshock Futureshock, don't panic! how do we deal with accelerating change? English en 20090814T210000 20090814T220000 01H00M00S Futureshock, don't panic!- how do we deal with accelerating change? A much improved and updated version of my 2005 What The Hack talk about the future of information, bio and nanotechologies, their convergence and it's consequences. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/152.en.html Monty Hall Arjen Kamphuis PUBLISH 195@HAR2009@pentabarf.org 195 Gnuradio workshop build your own wireless device in software (using Software Defined Radio) which can transmit and receive any wireless signal English en 20090815T190000 20090815T220000 03H00M00S Gnuradio workshop- build your own wireless device in software (using Software Defined Radio) which can transmit and receive any wireless signal In this workshop you will learn how to use Gnuradio to build Software Defined Radio applications which can transmit or receive any type of radiosignal. We will bring a few USRP's (Universal Software Radio Peripheral) which is an opensource hardware device which will be used as RF-frontend. All the processing (demodulation, modulation and so on) will run on your PC running Linux (Ubuntu jaunty is the easiest). PUBLIC CONFIRMED Lecture https://har2009.org/program/events/195.en.html Bike-shed Red PUBLISH 195@HAR2009@pentabarf.org 195 Gnuradio workshop build your own wireless device in software (using Software Defined Radio) which can transmit and receive any wireless signal englisch en 20090815T190000 20090815T220000 03H00M00S Gnuradio workshop- build your own wireless device in software (using Software Defined Radio) which can transmit and receive any wireless signal In this workshop you will learn how to use Gnuradio to build Software Defined Radio applications which can transmit or receive any type of radiosignal. We will bring a few USRP's (Universal Software Radio Peripheral) which is an opensource hardware device which will be used as RF-frontend. All the processing (demodulation, modulation and so on) will run on your PC running Linux (Ubuntu jaunty is the easiest). PUBLIC CONFIRMED Lecture https://har2009.org/program/events/195.en.html Bike-shed Red PUBLISH 180@HAR2009@pentabarf.org 180 biza Government and trust Government 2.0 englisch en 20090814T150000 20090814T160000 01H00M00S Government and trust- Government 2.0 Governments are, on some levels, moving towards more transparency, yet they often are reluctant to really accept citizens' input. In turn, citizens often don't trust that their ideas and stories will really be taken into account. How do we get out of this deadlock? Can we? PUBLIC CONFIRMED Lecture https://har2009.org/program/events/180.en.html The Two Envelopes Tent Arnout Ponsioen PUBLISH 180@HAR2009@pentabarf.org 180 biza Government and trust Government 2.0 English en 20090814T150000 20090814T160000 01H00M00S Government and trust- Government 2.0 Governments are, on some levels, moving towards more transparency, yet they often are reluctant to really accept citizens' input. In turn, citizens often don't trust that their ideas and stories will really be taken into account. How do we get out of this deadlock? Can we? PUBLIC CONFIRMED Lecture https://har2009.org/program/events/180.en.html The Two Envelopes Tent Arnout Ponsioen PUBLISH 137@HAR2009@pentabarf.org 137 hackerjeopardy Hacker Jeopardy Number guessing for geeks englisch en 20090815T220000 20090815T230000 01H00M00S Hacker Jeopardy- Number guessing for geeks Hacker Jeopardy Quiz Show, entertainment PUBLIC CONFIRMED Lecture https://har2009.org/program/events/137.en.html Monty Hall Ray Sec PUBLISH 137@HAR2009@pentabarf.org 137 hackerjeopardy Hacker Jeopardy Number guessing for geeks English en 20090815T220000 20090815T230000 01H00M00S Hacker Jeopardy- Number guessing for geeks Hacker Jeopardy Quiz Show, entertainment PUBLIC CONFIRMED Lecture https://har2009.org/program/events/137.en.html Monty Hall Ray Sec PUBLISH 101@HAR2009@pentabarf.org 101 hackerspaces_everywhere Hackerspaces Everywhere Building the Future englisch en 20090816T130000 20090816T140000 01H00M00S Hackerspaces Everywhere- Building the Future PUBLIC CONFIRMED Lecture https://har2009.org/program/events/101.en.html The Two Envelopes Tent astera PUBLISH 101@HAR2009@pentabarf.org 101 hackerspaces_everywhere Hackerspaces Everywhere Building the Future English en 20090816T130000 20090816T140000 01H00M00S Hackerspaces Everywhere- Building the Future PUBLIC CONFIRMED Lecture https://har2009.org/program/events/101.en.html The Two Envelopes Tent astera PUBLISH 96@HAR2009@pentabarf.org 96 Hacking Mona Lisa Technology and policy for the digital humanities and cultural heritage englisch en 20090814T140000 20090814T150000 01H00M00S Hacking Mona Lisa- Technology and policy for the digital humanities and cultural heritage I'd like to show some examples of the technologies that are used in bringing the the research areas of the humanities - history, art history, literature - and cultural heritage - collections and museums - to the web and present some of the technical and political challenges thereof: How to create novel databases of objects and "thick relations" for islamic manuscripts and how to deal with anonymous authors. How to serve gigabyte-size images of historical architectural drawings and other scans over low bandwidth lines in the web. How to deal with historical texts in diverse dead and living languages either artful with morphological analysis and ontologies or quickly and dirtyly. How to establish open source solutions and open access to historical sources and cultural heritage in some good and some bad examples of technology and policy. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/96.en.html Monty Hall Robert Casties PUBLISH 96@HAR2009@pentabarf.org 96 Hacking Mona Lisa Technology and policy for the digital humanities and cultural heritage English en 20090814T140000 20090814T150000 01H00M00S Hacking Mona Lisa- Technology and policy for the digital humanities and cultural heritage I'd like to show some examples of the technologies that are used in bringing the the research areas of the humanities - history, art history, literature - and cultural heritage - collections and museums - to the web and present some of the technical and political challenges thereof: How to create novel databases of objects and "thick relations" for islamic manuscripts and how to deal with anonymous authors. How to serve gigabyte-size images of historical architectural drawings and other scans over low bandwidth lines in the web. How to deal with historical texts in diverse dead and living languages either artful with morphological analysis and ontologies or quickly and dirtyly. How to establish open source solutions and open access to historical sources and cultural heritage in some good and some bad examples of technology and policy. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/96.en.html Monty Hall Robert Casties PUBLISH 150@HAR2009@pentabarf.org 150 future_of_science Hacking the Future of Science English en 20090813T130000 20090813T140000 01H00M00S Hacking the Future of Science PUBLIC CONFIRMED Lecture https://har2009.org/program/events/150.en.html Monty Hall Michael Nielsen PUBLISH 150@HAR2009@pentabarf.org 150 future_of_science Hacking the Future of Science englisch en 20090813T130000 20090813T140000 01H00M00S Hacking the Future of Science PUBLIC CONFIRMED Lecture https://har2009.org/program/events/150.en.html Monty Hall Michael Nielsen PUBLISH 79@HAR2009@pentabarf.org 79 hacking_plants Hacking with Plants Permaculture as another domain for (technical) design English en 20090813T200000 20090813T210000 01H00M00S Hacking with Plants- Permaculture as another domain for (technical) design Permaculture makes designs in the domain of (mostly) plants. Surprisingly, the approach in this fields greatly overlaps that of technical design. This means that designing an optimal plant system can be very appealing to a technical mind. And being inspired by nature, we may even learn a thing or two about our technical design style... PUBLIC CONFIRMED Lecture https://har2009.org/program/events/79.en.html The Birthday Tent Rick van Rein PUBLISH 79@HAR2009@pentabarf.org 79 hacking_plants Hacking with Plants Permaculture as another domain for (technical) design englisch en 20090813T200000 20090813T210000 01H00M00S Hacking with Plants- Permaculture as another domain for (technical) design Permaculture makes designs in the domain of (mostly) plants. Surprisingly, the approach in this fields greatly overlaps that of technical design. This means that designing an optimal plant system can be very appealing to a technical mind. And being inspired by nature, we may even learn a thing or two about our technical design style... PUBLIC CONFIRMED Lecture https://har2009.org/program/events/79.en.html The Birthday Tent Rick van Rein PUBLISH 110@HAR2009@pentabarf.org 110 Hack the law! Defend your freedoms while having fun! englisch en 20090816T120000 20090816T130000 01H00M00S Hack the law!- Defend your freedoms while having fun! What happens when laws try to control the digital environment? Telecoms Package, "three strikes" (HADOPI), content filtering, software patents... It's all about control! Is law hackable like code? What can we do to change the law? How to do it? How can a bunch of hackers promote a better and more open society? PUBLIC CONFIRMED Lecture https://har2009.org/program/events/110.en.html Monty Hall Jérémie Zimmermann PUBLISH 110@HAR2009@pentabarf.org 110 Hack the law! Defend your freedoms while having fun! English en 20090816T120000 20090816T130000 01H00M00S Hack the law!- Defend your freedoms while having fun! What happens when laws try to control the digital environment? Telecoms Package, "three strikes" (HADOPI), content filtering, software patents... It's all about control! Is law hackable like code? What can we do to change the law? How to do it? How can a bunch of hackers promote a better and more open society? PUBLIC CONFIRMED Lecture https://har2009.org/program/events/110.en.html Monty Hall Jérémie Zimmermann PUBLISH 100@HAR2009@pentabarf.org 100 har_network_overview HAR Network Overview & BlinkenArea movie contest results English en 20090816T150000 20090816T160000 01H00M00S HAR Network Overview & BlinkenArea movie contest results PUBLIC CONFIRMED Lecture https://har2009.org/program/events/100.en.html Monty Hall Elisa Jasinska Leon Weber Stephan 'ST' Kambor PUBLISH 100@HAR2009@pentabarf.org 100 har_network_overview HAR Network Overview & BlinkenArea movie contest results englisch en 20090816T150000 20090816T160000 01H00M00S HAR Network Overview & BlinkenArea movie contest results PUBLIC CONFIRMED Lecture https://har2009.org/program/events/100.en.html Monty Hall Elisa Jasinska Leon Weber Stephan 'ST' Kambor PUBLISH 103@HAR2009@pentabarf.org 103 How to reverse engineer backdoor algoritms hidden in firmware. Disclosure of a backdoor in Accton based switches (3com and others) englisch en 20090815T140000 20090815T150000 01H00M00S How to reverse engineer backdoor algoritms hidden in firmware.- Disclosure of a backdoor in Accton based switches (3com and others) How we reverse engineered a remote accesible backdoor in Accton-based switches. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/103.en.html The Birthday Tent psy PUBLISH 103@HAR2009@pentabarf.org 103 How to reverse engineer backdoor algoritms hidden in firmware. Disclosure of a backdoor in Accton based switches (3com and others) English en 20090815T140000 20090815T150000 01H00M00S How to reverse engineer backdoor algoritms hidden in firmware.- Disclosure of a backdoor in Accton based switches (3com and others) How we reverse engineered a remote accesible backdoor in Accton-based switches. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/103.en.html The Birthday Tent psy PUBLISH 153@HAR2009@pentabarf.org 153 quantum_crypto How to use quantum cryptography for secure identification Making the most of noise englisch en 20090815T140000 20090815T150000 01H00M00S How to use quantum cryptography for secure identification- Making the most of noise The goal of secure identification is to enable a user, Alice, to identify herself to Bob without revealing her password. Unfortunately, like many other interesting cryptographic problems involving two parties, this is impossible to achieve without making assumptions. For example, we could assume that factoring a large number is difficult. However it is not known whether this assumption is correct. In this talk, we will instead assume that it is difficult to store quantum states, in the sense that the quantum memory available to an attacker is noisy. We propose a simple quantum protocol that can be used to solve this task which is implementable using present day hardware. No knowledge of quantum cryptography or math will be required. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/153.en.html The Two Envelopes Tent Stephanie Wehner PUBLISH 153@HAR2009@pentabarf.org 153 quantum_crypto How to use quantum cryptography for secure identification Making the most of noise English en 20090815T140000 20090815T150000 01H00M00S How to use quantum cryptography for secure identification- Making the most of noise The goal of secure identification is to enable a user, Alice, to identify herself to Bob without revealing her password. Unfortunately, like many other interesting cryptographic problems involving two parties, this is impossible to achieve without making assumptions. For example, we could assume that factoring a large number is difficult. However it is not known whether this assumption is correct. In this talk, we will instead assume that it is difficult to store quantum states, in the sense that the quantum memory available to an attacker is noisy. We propose a simple quantum protocol that can be used to solve this task which is implementable using present day hardware. No knowledge of quantum cryptography or math will be required. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/153.en.html The Two Envelopes Tent Stephanie Wehner PUBLISH 63@HAR2009@pentabarf.org 63 how_we_hack How we break into domains What every admin should know about Windows security englisch en 20090815T130000 20090815T140000 01H00M00S How we break into domains- What every admin should know about Windows security It's a cliché that most networks are hard on the outside and soft and chewy on the inside, but it's true. Securing networks is hard and it shows: most domains are easy to break into. I'll describe the weaknesses in networks we abuse to gain access to most, if not all, systems on a LAN. We'll go over some of the basics, such as problems with patching and passwords, but also some more advanced recent developments, such as hijacking Windows access tokens. I will describe how state of the art techniques can be combined to take over a domain, and how to protect your domain and your company. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/63.en.html Monty Hall Niels Teusink PUBLISH 63@HAR2009@pentabarf.org 63 how_we_hack How we break into domains What every admin should know about Windows security English en 20090815T130000 20090815T140000 01H00M00S How we break into domains- What every admin should know about Windows security It's a cliché that most networks are hard on the outside and soft and chewy on the inside, but it's true. Securing networks is hard and it shows: most domains are easy to break into. I'll describe the weaknesses in networks we abuse to gain access to most, if not all, systems on a LAN. We'll go over some of the basics, such as problems with patching and passwords, but also some more advanced recent developments, such as hijacking Windows access tokens. I will describe how state of the art techniques can be combined to take over a domain, and how to protect your domain and your company. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/63.en.html Monty Hall Niels Teusink PUBLISH 168@HAR2009@pentabarf.org 168 quantum_eavesdropping How we eavesdropped 100% of a quantum cryptographic key English en 20090814T200000 20090814T210000 01H00M00S How we eavesdropped 100% of a quantum cryptographic key Quantum cryptography, as being based on the laws of physics, was claimed to be much more secure than all classical cryptography schemes. (Un)fortunately physical hardware is not beyond of an evil control: We present a successful attack of an existing quantum key distribution system exploiting a photon detector vulnerability which is probably present in all existing devices. Without Alice and Bob losing their faith in their secure communication, we recorded 100% of the supposedly secret key. The actual eavesdropping hardware we have built will be shown during the conference. A brief intro into quantum cryptography will be given at the beginning of the talk. Then, Vadim Makarov will explain the above attack. At the end of the talk, Ilja Gerhardt will (hopefully) present another application of the discovered detector vulnerability, which shall remain a surprise :) PUBLIC CONFIRMED Lecture https://har2009.org/program/events/168.en.html Monty Hall Ilja Gerhardt Vadim Makarov PUBLISH 168@HAR2009@pentabarf.org 168 quantum_eavesdropping How we eavesdropped 100% of a quantum cryptographic key englisch en 20090814T200000 20090814T210000 01H00M00S How we eavesdropped 100% of a quantum cryptographic key Quantum cryptography, as being based on the laws of physics, was claimed to be much more secure than all classical cryptography schemes. (Un)fortunately physical hardware is not beyond of an evil control: We present a successful attack of an existing quantum key distribution system exploiting a photon detector vulnerability which is probably present in all existing devices. Without Alice and Bob losing their faith in their secure communication, we recorded 100% of the supposedly secret key. The actual eavesdropping hardware we have built will be shown during the conference. A brief intro into quantum cryptography will be given at the beginning of the talk. Then, Vadim Makarov will explain the above attack. At the end of the talk, Ilja Gerhardt will (hopefully) present another application of the discovered detector vulnerability, which shall remain a surprise :) PUBLIC CONFIRMED Lecture https://har2009.org/program/events/168.en.html Monty Hall Ilja Gerhardt Vadim Makarov PUBLISH 75@HAR2009@pentabarf.org 75 identity_processes Identity processes Why we put our most intimate details on the net and are still worried about our privacy English en 20090814T210000 20090814T220000 01H00M00S Identity processes- Why we put our most intimate details on the net and are still worried about our privacy When trying to understand what privacy is and how it works, it is very helpful to have some idea of what human identity is. In this presentation I will sharpen our concept of privacy by taking a 'discursive' view on identity as starting point. This enables us to understand the privacy challenges the digitalization of our society poses. After this presentation you will know: - why identities can't be stolen - why we put our most intimate details on the net and are still worried about our privacy - why ISP's and search engines are in the frontline of the privacy debate - what the problem is of modern surveillance - And of course you will know the most brutal ways to violate somebodies privacy. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/75.en.html The Two Envelopes Tent Winfried Tilanus PUBLISH 75@HAR2009@pentabarf.org 75 identity_processes Identity processes Why we put our most intimate details on the net and are still worried about our privacy englisch en 20090814T210000 20090814T220000 01H00M00S Identity processes- Why we put our most intimate details on the net and are still worried about our privacy When trying to understand what privacy is and how it works, it is very helpful to have some idea of what human identity is. In this presentation I will sharpen our concept of privacy by taking a 'discursive' view on identity as starting point. This enables us to understand the privacy challenges the digitalization of our society poses. After this presentation you will know: - why identities can't be stolen - why we put our most intimate details on the net and are still worried about our privacy - why ISP's and search engines are in the frontline of the privacy debate - what the problem is of modern surveillance - And of course you will know the most brutal ways to violate somebodies privacy. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/75.en.html The Two Envelopes Tent Winfried Tilanus PUBLISH 209@HAR2009@pentabarf.org 209 IPv6 20090815T120000 20090815T130000 01H00M00S IPv6 PUBLIC CONFIRMED Lecture https://har2009.org/program/events/209.en.html Bike-shed Red PUBLISH 209@HAR2009@pentabarf.org 209 IPv6 20090815T120000 20090815T130000 01H00M00S IPv6 PUBLIC CONFIRMED Lecture https://har2009.org/program/events/209.en.html Bike-shed Red PUBLISH 127@HAR2009@pentabarf.org 127 java_card Java Card Another Java hype or what? englisch en 20090814T120000 20090814T130000 01H00M00S Java Card- Another Java hype or what? PUBLIC CONFIRMED Lecture https://har2009.org/program/events/127.en.html The Two Envelopes Tent Eduard Karel de Jong PUBLISH 127@HAR2009@pentabarf.org 127 java_card Java Card Another Java hype or what? English en 20090814T120000 20090814T130000 01H00M00S Java Card- Another Java hype or what? PUBLIC CONFIRMED Lecture https://har2009.org/program/events/127.en.html The Two Envelopes Tent Eduard Karel de Jong PUBLISH 68@HAR2009@pentabarf.org 68 Life or Death Cryptology: it is not about the encryption algorithm englisch en 20090815T170000 20090815T180000 01H00M00S Life or Death Cryptology: it is not about the encryption algorithm Protecting secrets is hard. Some of the things you currently trust to protect your secrets may be totally wrong. Even more so if you look at international espionage and protecting Top Secret information at the government level. A view into the world of state level security may really influence the way you look at protecting secrets. As information becomes more important, more threats arise. It actually all boils down to one thing. Trust. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/68.en.html The Two Envelopes Tent Paul Bakker PUBLISH 68@HAR2009@pentabarf.org 68 Life or Death Cryptology: it is not about the encryption algorithm English en 20090815T170000 20090815T180000 01H00M00S Life or Death Cryptology: it is not about the encryption algorithm Protecting secrets is hard. Some of the things you currently trust to protect your secrets may be totally wrong. Even more so if you look at international espionage and protecting Top Secret information at the government level. A view into the world of state level security may really influence the way you look at protecting secrets. As information becomes more important, more threats arise. It actually all boils down to one thing. Trust. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/68.en.html The Two Envelopes Tent Paul Bakker PUBLISH 182@HAR2009@pentabarf.org 182 lightning_friday Lightning talks Friday 7 short lectures in 2 hours englisch en 20090814T110000 20090814T130000 02H00M00S Lightning talks Friday- 7 short lectures in 2 hours PUBLIC CONFIRMED Lecture https://har2009.org/program/events/182.en.html The Birthday Tent Don Hopkins Hoppel jbe Melvin Rook Rene "cavac" Schickbauer Sébastien Bourdeauducq tille PUBLISH 182@HAR2009@pentabarf.org 182 lightning_friday Lightning talks Friday 7 short lectures in 2 hours English en 20090814T110000 20090814T130000 02H00M00S Lightning talks Friday- 7 short lectures in 2 hours PUBLIC CONFIRMED Lecture https://har2009.org/program/events/182.en.html The Birthday Tent Don Hopkins Hoppel jbe Melvin Rook Rene "cavac" Schickbauer Sébastien Bourdeauducq tille PUBLISH 183@HAR2009@pentabarf.org 183 lightning_saturday Lightning talks Saturday 7 short lectures in 2 hours English en 20090815T110000 20090815T130000 02H00M00S Lightning talks Saturday- 7 short lectures in 2 hours PUBLIC CONFIRMED Lecture https://har2009.org/program/events/183.en.html The Birthday Tent Elger 'Stitch' Jonker Esther Weltevrede Harmen P. (Murf) de Ruiter Kristian Mueller Menneau Rene "cavac" Schickbauer Ruediger Weis Wouter Tebbens PUBLISH 183@HAR2009@pentabarf.org 183 lightning_saturday Lightning talks Saturday 7 short lectures in 2 hours englisch en 20090815T110000 20090815T130000 02H00M00S Lightning talks Saturday- 7 short lectures in 2 hours PUBLIC CONFIRMED Lecture https://har2009.org/program/events/183.en.html The Birthday Tent Elger 'Stitch' Jonker Esther Weltevrede Harmen P. (Murf) de Ruiter Kristian Mueller Menneau Rene "cavac" Schickbauer Ruediger Weis Wouter Tebbens PUBLISH 32@HAR2009@pentabarf.org 32 Locally Exploiting Wireless Sensors Breaking AES by Syringe englisch en 20090816T130000 20090816T140000 01H00M00S Locally Exploiting Wireless Sensors- Breaking AES by Syringe Wireless sensors are often built with a microcontroller and a radio chip, connected only by a SPI bus. The radio, not the MCU, is responsible for symmetric cryptography of each packet. When the key is loaded, it is sent as cleartext over the SPI bus, and an attacker with local access can steal the key using a few syringe probes and readily available hardware. This attack and other local attacks against wireless sensor networks will be presented in detail, including a live demo of an AES128 key being extracted from an operational network. Following the conclusion of the lecture, audience members will be brought onstage to perform the attack themselves on various pieces of example hardware. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/32.en.html The Birthday Tent Travis Goodspeed PUBLISH 32@HAR2009@pentabarf.org 32 Locally Exploiting Wireless Sensors Breaking AES by Syringe English en 20090816T130000 20090816T140000 01H00M00S Locally Exploiting Wireless Sensors- Breaking AES by Syringe Wireless sensors are often built with a microcontroller and a radio chip, connected only by a SPI bus. The radio, not the MCU, is responsible for symmetric cryptography of each packet. When the key is loaded, it is sent as cleartext over the SPI bus, and an attacker with local access can steal the key using a few syringe probes and readily available hardware. This attack and other local attacks against wireless sensor networks will be presented in detail, including a live demo of an AES128 key being extracted from an operational network. Following the conclusion of the lecture, audience members will be brought onstage to perform the attack themselves on various pieces of example hardware. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/32.en.html The Birthday Tent Travis Goodspeed PUBLISH 159@HAR2009@pentabarf.org 159 Lockpicking How lock-enthousiasts are keeping up with the state of the art English en 20090815T210000 20090815T220000 01H00M00S Lockpicking- How lock-enthousiasts are keeping up with the state of the art This talk will detail the changes in lockpicking. It will tell the story of a rapidly changing universe once dark and mysterious which is now increasingly populated by lock-enthousiasts that simply enjoy the challenge mechanical locks present and freely share what they learn. You will learn how the lock industry is coming to terms with all of this, about new developments in safes, locks and opening techniques and you will get a general idea of how the world of locks and lockpicking is maturing. Barry and Han have done entertaining presentations on lockpicking at past hacker events and both take pride in never doing the same talk twice and always coming up with something new to show. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/159.en.html The Birthday Tent Barry - The Key - Wels Han Fey PUBLISH 159@HAR2009@pentabarf.org 159 Lockpicking How lock-enthousiasts are keeping up with the state of the art englisch en 20090815T210000 20090815T220000 01H00M00S Lockpicking- How lock-enthousiasts are keeping up with the state of the art This talk will detail the changes in lockpicking. It will tell the story of a rapidly changing universe once dark and mysterious which is now increasingly populated by lock-enthousiasts that simply enjoy the challenge mechanical locks present and freely share what they learn. You will learn how the lock industry is coming to terms with all of this, about new developments in safes, locks and opening techniques and you will get a general idea of how the world of locks and lockpicking is maturing. Barry and Han have done entertaining presentations on lockpicking at past hacker events and both take pride in never doing the same talk twice and always coming up with something new to show. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/159.en.html The Birthday Tent Barry - The Key - Wels Han Fey PUBLISH 205@HAR2009@pentabarf.org 205 Massage for Nerds englisch en 20090814T210000 20090814T220000 01H00M00S Massage for Nerds Feeling tense? Overworked? Always wanted to know the secrets to good relaxation? The massage for nerds workshop may be of help. I will try to teach you some basic massage principles and skills and demonstrate some techniques to relax. Wear loose clothing, you may want to bring a matress (not the big wobbly instable inflatable ones, they don't work well). Part of it is self-massage, the other part is work with a partner. You can bring your own nerd or find one on the spot. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/205.en.html Bike-shed Green PUBLISH 205@HAR2009@pentabarf.org 205 Massage for Nerds English en 20090814T210000 20090814T220000 01H00M00S Massage for Nerds Feeling tense? Overworked? Always wanted to know the secrets to good relaxation? The massage for nerds workshop may be of help. I will try to teach you some basic massage principles and skills and demonstrate some techniques to relax. Wear loose clothing, you may want to bring a matress (not the big wobbly instable inflatable ones, they don't work well). Part of it is self-massage, the other part is work with a partner. You can bring your own nerd or find one on the spot. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/205.en.html Bike-shed Green PUBLISH 77@HAR2009@pentabarf.org 77 MinixWall rethinking secure systems English en 20090816T120000 20090816T130000 01H00M00S MinixWall- rethinking secure systems Two of the main points are size and isolation. The Minix 3 kernel is less than thousand times smaller as Linux. All drivers and the IP stack live in user land. And this time Minix is Open Source. We show a portation of the netfilter framework, which leads to a system with better stability and security than the widely used Linux solutions. Additional we present some new result regarding virtualiced systems using a small amount of resources to add MinixWall into existing systems. Additional we present some new result regarding virtualized systems using a small amount of resources to add MinixWall into existing systems. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/77.en.html The Birthday Tent Ruediger Weis PUBLISH 77@HAR2009@pentabarf.org 77 MinixWall rethinking secure systems englisch en 20090816T120000 20090816T130000 01H00M00S MinixWall- rethinking secure systems Two of the main points are size and isolation. The Minix 3 kernel is less than thousand times smaller as Linux. All drivers and the IP stack live in user land. And this time Minix is Open Source. We show a portation of the netfilter framework, which leads to a system with better stability and security than the widely used Linux solutions. Additional we present some new result regarding virtualiced systems using a small amount of resources to add MinixWall into existing systems. Additional we present some new result regarding virtualized systems using a small amount of resources to add MinixWall into existing systems. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/77.en.html The Birthday Tent Ruediger Weis PUBLISH 204@HAR2009@pentabarf.org 204 Multitouch workshop Create your own multitouch application. englisch en 20090814T180000 20090814T210000 03H00M00S Multitouch workshop- Create your own multitouch application. In this workshop you will learn the basics of multitouch software development with [libavg](http://libavg.de/ "libavg") and create your own multitouch application. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/204.en.html Bike-shed Yellow PUBLISH 204@HAR2009@pentabarf.org 204 Multitouch workshop Create your own multitouch application. English en 20090814T180000 20090814T210000 03H00M00S Multitouch workshop- Create your own multitouch application. In this workshop you will learn the basics of multitouch software development with [libavg](http://libavg.de/ "libavg") and create your own multitouch application. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/204.en.html Bike-shed Yellow PUBLISH 188@HAR2009@pentabarf.org 188 MultiVerse workshop Creating an open, decentralized, virtual world. englisch en 20090814T140000 20090814T160000 02H00M00S MultiVerse workshop- Creating an open, decentralized, virtual world. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/188.en.html Bike-shed Green Gabriel Konat Melvin Rook PUBLISH 188@HAR2009@pentabarf.org 188 MultiVerse workshop Creating an open, decentralized, virtual world. English en 20090814T140000 20090814T160000 02H00M00S MultiVerse workshop- Creating an open, decentralized, virtual world. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/188.en.html Bike-shed Green Gabriel Konat Melvin Rook PUBLISH 145@HAR2009@pentabarf.org 145 My BREIN hurts! FTD's fight against the "Dutch RIAA" englisch en 20090816T140000 20090816T150000 01H00M00S My BREIN hurts! - FTD's fight against the "Dutch RIAA" Under Dutch copyright law, downloading movies and songs for personal use is entirely legal. This presents a unique legal problem for copyright enforcers like "Dutch RIAA" /Stichting BREIN/. Many sites have popped up that point people to opportunities for legal downloading. One of them is FTD, a place to "spot" binaries posted on Usenet. BREIN has accused Usenet and FTD of "facilitating illegal uploading for profit" and called FTD's activities "a criminal act". In response, FTD has gone to court to demand a ruling that FTD is operating legally, that downloading is legal and that BREIN should just shut up. Dutch IT-lawyer Arnoud Engelfriet, one of the lawyers representing FTD in court, will discuss the court case and the Dutch legal situation. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/145.en.html Monty Hall Arnoud Engelfriet PUBLISH 145@HAR2009@pentabarf.org 145 My BREIN hurts! FTD's fight against the "Dutch RIAA" English en 20090816T140000 20090816T150000 01H00M00S My BREIN hurts! - FTD's fight against the "Dutch RIAA" Under Dutch copyright law, downloading movies and songs for personal use is entirely legal. This presents a unique legal problem for copyright enforcers like "Dutch RIAA" /Stichting BREIN/. Many sites have popped up that point people to opportunities for legal downloading. One of them is FTD, a place to "spot" binaries posted on Usenet. BREIN has accused Usenet and FTD of "facilitating illegal uploading for profit" and called FTD's activities "a criminal act". In response, FTD has gone to court to demand a ruling that FTD is operating legally, that downloading is legal and that BREIN should just shut up. Dutch IT-lawyer Arnoud Engelfriet, one of the lawyers representing FTD in court, will discuss the court case and the Dutch legal situation. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/145.en.html Monty Hall Arnoud Engelfriet PUBLISH 94@HAR2009@pentabarf.org 94 Native IPv6 deployment at XS4ALL English en 20090814T150000 20090814T160000 01H00M00S Native IPv6 deployment at XS4ALL XS4ALL is currently rolling out native IPv6 on it's network. This talk will show some of the technology involved and problems encountered. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/94.en.html The Birthday Tent Marco Hogewoning PUBLISH 94@HAR2009@pentabarf.org 94 Native IPv6 deployment at XS4ALL englisch en 20090814T150000 20090814T160000 01H00M00S Native IPv6 deployment at XS4ALL XS4ALL is currently rolling out native IPv6 on it's network. This talk will show some of the technology involved and problems encountered. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/94.en.html The Birthday Tent Marco Hogewoning PUBLISH 53@HAR2009@pentabarf.org 53 openbeer_workshop OpenBeer Workshop Learn how to make a delicious home-brew beer englisch en 20090814T150000 20090814T170000 02H00M00S OpenBeer Workshop- Learn how to make a delicious home-brew beer In this workshop we will first discuss the theory behind brewing. After that, we will do the actual brewing. The day after, fermentation starts. Participants can opt in to be sent a bottle of their own brew about 3 weeks after the event. There might also be some tasting sessions. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/53.en.html Village BSD tille PUBLISH 53@HAR2009@pentabarf.org 53 openbeer_workshop OpenBeer Workshop Learn how to make a delicious home-brew beer English en 20090814T150000 20090814T170000 02H00M00S OpenBeer Workshop- Learn how to make a delicious home-brew beer In this workshop we will first discuss the theory behind brewing. After that, we will do the actual brewing. The day after, fermentation starts. Participants can opt in to be sent a bottle of their own brew about 3 weeks after the event. There might also be some tasting sessions. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/53.en.html Village BSD tille PUBLISH 194@HAR2009@pentabarf.org 194 Open Blueprints Creative Commons & Design 20090815T150000 20090815T180000 03H00M00S Open Blueprints- Creative Commons & Design A workshop on how to apply a creative commons license for design and the judicial space between copyright and model right. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/194.en.html Bike-shed Yellow Ronen Kadushin PUBLISH 194@HAR2009@pentabarf.org 194 Open Blueprints Creative Commons & Design 20090815T150000 20090815T180000 03H00M00S Open Blueprints- Creative Commons & Design A workshop on how to apply a creative commons license for design and the judicial space between copyright and model right. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/194.en.html Bike-shed Yellow Ronen Kadushin PUBLISH 185@HAR2009@pentabarf.org 185 openbsc OpenBSC Running your own GSM network 20090815T150000 20090815T160000 01H00M00S OpenBSC- Running your own GSM network OpenBSC is a Free Software implementation of the minimal subset of the major backend components of a GSM network, such as BSC, MSC, HLR, EIR. Using a commercial GSM BTS and attaching it to a Linux system running the OpenBSC software allows you to run your own GSM "network in a box". PUBLIC CONFIRMED Lecture https://har2009.org/program/events/185.en.html Monty Hall Harald Welte PUBLISH 185@HAR2009@pentabarf.org 185 openbsc OpenBSC Running your own GSM network 20090815T150000 20090815T160000 01H00M00S OpenBSC- Running your own GSM network OpenBSC is a Free Software implementation of the minimal subset of the major backend components of a GSM network, such as BSC, MSC, HLR, EIR. Using a commercial GSM BTS and attaching it to a Linux system running the OpenBSC software allows you to run your own GSM "network in a box". PUBLIC CONFIRMED Lecture https://har2009.org/program/events/185.en.html Monty Hall Harald Welte PUBLISH 85@HAR2009@pentabarf.org 85 har_opening Opening ceremony Welcome to HAR2009 English en 20090813T110000 20090813T120000 01H00M00S Opening ceremony- Welcome to HAR2009 Opening ceremony. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/85.en.html Monty Hall Koen Martens PUBLISH 85@HAR2009@pentabarf.org 85 har_opening Opening ceremony Welcome to HAR2009 englisch en 20090813T110000 20090813T120000 01H00M00S Opening ceremony- Welcome to HAR2009 Opening ceremony. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/85.en.html Monty Hall Koen Martens PUBLISH 61@HAR2009@pentabarf.org 61 opensolaris_workshop OpenSolaris Workshop Why switch? What's better? Why another open source operating system? English en 20090813T200000 20090813T220000 02H00M00S OpenSolaris Workshop- Why switch? What's better? Why another open source operating system? At first glance, you may mistake OpenSolaris for any other Linux distro. It uses GNOME for its desktop and GNU utilities such as sudo and top work as expected. However, as you dig deeper you'll find some nice surprises - a truly granular security framework, a service management facility that replaces antiquated rc*.d scripts, a dynamic tracing utility with incredible insight and a a new file system that is utterly refreshing. In this hands-on-workshop we'll cover the following: * The OpenSolaris you already know o GNOME o GNU Utilities * The OpenSolaris you want to know o RBAC o SMF o DTrace o ZFS w/ TimeSlider * The OpenSolaris you need to know o IPS o Networking o The Innovation Continues PUBLIC CONFIRMED Lecture https://har2009.org/program/events/61.en.html Bike-shed Green Brian Leonard PUBLISH 61@HAR2009@pentabarf.org 61 opensolaris_workshop OpenSolaris Workshop Why switch? What's better? Why another open source operating system? englisch en 20090813T200000 20090813T220000 02H00M00S OpenSolaris Workshop- Why switch? What's better? Why another open source operating system? At first glance, you may mistake OpenSolaris for any other Linux distro. It uses GNOME for its desktop and GNU utilities such as sudo and top work as expected. However, as you dig deeper you'll find some nice surprises - a truly granular security framework, a service management facility that replaces antiquated rc*.d scripts, a dynamic tracing utility with incredible insight and a a new file system that is utterly refreshing. In this hands-on-workshop we'll cover the following: * The OpenSolaris you already know o GNOME o GNU Utilities * The OpenSolaris you want to know o RBAC o SMF o DTrace o ZFS w/ TimeSlider * The OpenSolaris you need to know o IPS o Networking o The Innovation Continues PUBLIC CONFIRMED Lecture https://har2009.org/program/events/61.en.html Bike-shed Green Brian Leonard PUBLISH 113@HAR2009@pentabarf.org 113 organising_a_con Organising a Con englisch en 20090816T140000 20090816T150000 01H00M00S Organising a Con Presentation and discussion from a panel of core conference organizers on their experiences in organizing conferences. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/113.en.html The Two Envelopes Tent David Dolphin (tyrion) PUBLISH 113@HAR2009@pentabarf.org 113 organising_a_con Organising a Con English en 20090816T140000 20090816T150000 01H00M00S Organising a Con Presentation and discussion from a panel of core conference organizers on their experiences in organizing conferences. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/113.en.html The Two Envelopes Tent David Dolphin (tyrion) PUBLISH 59@HAR2009@pentabarf.org 59 government_transparency Our dutch road to government transparency Dutch road to help free our government from closed workflows and closed ict-systems English en 20090815T130000 20090815T140000 01H00M00S Our dutch road to government transparency- Dutch road to help free our government from closed workflows and closed ict-systems PUBLIC CONFIRMED Lecture https://har2009.org/program/events/59.en.html Bike-shed Green Jelle de Jong PUBLISH 59@HAR2009@pentabarf.org 59 government_transparency Our dutch road to government transparency Dutch road to help free our government from closed workflows and closed ict-systems englisch en 20090815T130000 20090815T140000 01H00M00S Our dutch road to government transparency- Dutch road to help free our government from closed workflows and closed ict-systems PUBLIC CONFIRMED Lecture https://har2009.org/program/events/59.en.html Bike-shed Green Jelle de Jong PUBLISH 170@HAR2009@pentabarf.org 170 panel_discussion Panel discussion with Brein and HAR English en 20090814T170000 20090814T180000 01H00M00S Panel discussion with Brein and HAR Panel discussion with Brein, MPAA and HAR PUBLIC CONFIRMED Lecture https://har2009.org/program/events/170.en.html Monty Hall Arjen Kamphuis Tim Kuik Walter van Holst PUBLISH 170@HAR2009@pentabarf.org 170 panel_discussion Panel discussion with Brein and HAR englisch en 20090814T170000 20090814T180000 01H00M00S Panel discussion with Brein and HAR Panel discussion with Brein, MPAA and HAR PUBLIC CONFIRMED Lecture https://har2009.org/program/events/170.en.html Monty Hall Arjen Kamphuis Tim Kuik Walter van Holst PUBLISH 193@HAR2009@pentabarf.org 193 pgp_and_cacert_key_signing_party PGP and CAcert key signing party Have your PGP key signed; have yourself assured englisch en 20090815T180000 20090815T200000 02H00M00S PGP and CAcert key signing party- Have your PGP key signed; have yourself assured PGP public key and CAcert certificate identification is based on multiple (the more the better) persons doing an identification check with official identity document(s), like a driver license, passports, identity cards, etc.: the Web of Trustworthy. The Web of Trust is basically a reciprocal process: one has to identify to each other. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/193.en.html The Birthday Tent Udo PUBLISH 193@HAR2009@pentabarf.org 193 pgp_and_cacert_key_signing_party PGP and CAcert key signing party Have your PGP key signed; have yourself assured English en 20090815T180000 20090815T200000 02H00M00S PGP and CAcert key signing party- Have your PGP key signed; have yourself assured PGP public key and CAcert certificate identification is based on multiple (the more the better) persons doing an identification check with official identity document(s), like a driver license, passports, identity cards, etc.: the Web of Trustworthy. The Web of Trust is basically a reciprocal process: one has to identify to each other. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/193.en.html The Birthday Tent Udo PUBLISH 151@HAR2009@pentabarf.org 151 Policy hacking Open Source Lobbying, tips from the trenches englisch en 20090813T140000 20090813T150000 01H00M00S Policy hacking- Open Source Lobbying, tips from the trenches In 2007 The Netherlands became the first western country to have a national policy on the mandatory use of open standards and preferential use of opensource software in all public sector organisations (government, educations, healthcare ...). Having been involved in the process of creating this policy I will share some of my lesson learned about policy hacking. This talk will be an update of my 2007 CCC-talk about the same subject. Many things have happened since then and there are new tales to be told. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/151.en.html The Birthday Tent Arjen Kamphuis PUBLISH 151@HAR2009@pentabarf.org 151 Policy hacking Open Source Lobbying, tips from the trenches English en 20090813T140000 20090813T150000 01H00M00S Policy hacking- Open Source Lobbying, tips from the trenches In 2007 The Netherlands became the first western country to have a national policy on the mandatory use of open standards and preferential use of opensource software in all public sector organisations (government, educations, healthcare ...). Having been involved in the process of creating this policy I will share some of my lesson learned about policy hacking. This talk will be an update of my 2007 CCC-talk about the same subject. Many things have happened since then and there are new tales to be told. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/151.en.html The Birthday Tent Arjen Kamphuis PUBLISH 133@HAR2009@pentabarf.org 133 privacy_and_stylometry Privacy & Stylometry: Practical Attacks Against Authorship Attribution Techniques Protecting your identity through your writing style: how can attacking stylometry improve privacy? englisch en 20090814T220000 20090814T230000 01H00M00S Privacy & Stylometry: Practical Attacks Against Authorship Attribution Techniques- Protecting your identity through your writing style: how can attacking stylometry improve privacy? The use of statistical AI techniques in authorship recognition (or stylometry) has contributed to literary and historical breakthroughs. These successes have led to the use of these techniques in criminal investigations and prosecutions. However, few have studied adversarial attacks, motivated by a desire to protect anonymity and privacy in a variety of scenarios, and their devastating effect on the robustness of existing classification methods. Our research demonstrates how various types of attacks can reduce the effectiveness of stylometric techniques down to the level of random guessing and worse. These results are made more significant by the fact that the experimental subjects were unfamiliar with stylometric techniques, without specialized knowledge in linguistics, and spent little time on the attacks. Current work based on these results that looks deeper into implications of stylometry on privacy and anonymity on the Internet is also discussed. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/133.en.html The Birthday Tent Mike Brennan PUBLISH 133@HAR2009@pentabarf.org 133 privacy_and_stylometry Privacy & Stylometry: Practical Attacks Against Authorship Attribution Techniques Protecting your identity through your writing style: how can attacking stylometry improve privacy? English en 20090814T220000 20090814T230000 01H00M00S Privacy & Stylometry: Practical Attacks Against Authorship Attribution Techniques- Protecting your identity through your writing style: how can attacking stylometry improve privacy? The use of statistical AI techniques in authorship recognition (or stylometry) has contributed to literary and historical breakthroughs. These successes have led to the use of these techniques in criminal investigations and prosecutions. However, few have studied adversarial attacks, motivated by a desire to protect anonymity and privacy in a variety of scenarios, and their devastating effect on the robustness of existing classification methods. Our research demonstrates how various types of attacks can reduce the effectiveness of stylometric techniques down to the level of random guessing and worse. These results are made more significant by the fact that the experimental subjects were unfamiliar with stylometric techniques, without specialized knowledge in linguistics, and spent little time on the attacks. Current work based on these results that looks deeper into implications of stylometry on privacy and anonymity on the Internet is also discussed. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/133.en.html The Birthday Tent Mike Brennan PUBLISH 28@HAR2009@pentabarf.org 28 programming_the_cloud Programming the cloud What will Cloud computing bring English en 20090813T170000 20090813T180000 01H00M00S Programming the cloud- What will Cloud computing bring Cloud computing is rapidly gaining the interest of service providers, programmers and the public as no one wants to miss the new hype. While there are many theories on how the cloud will evolve no real discussion on the programmability has yet taken place. In this talk a programing language named objic is described, that enables programs to run in a distributed manner in the cloud. This is done by creating an object orientated syntax and interpretation environment that can create objects on various distributed locations throughout a network and address them in a scalable, fault tolerant and transparent way. This is followed by a discussion of the problems faced and an outlook into the future. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/28.en.html The Two Envelopes Tent Geerd-Dietger Hoffmann PUBLISH 28@HAR2009@pentabarf.org 28 programming_the_cloud Programming the cloud What will Cloud computing bring englisch en 20090813T170000 20090813T180000 01H00M00S Programming the cloud- What will Cloud computing bring Cloud computing is rapidly gaining the interest of service providers, programmers and the public as no one wants to miss the new hype. While there are many theories on how the cloud will evolve no real discussion on the programmability has yet taken place. In this talk a programing language named objic is described, that enables programs to run in a distributed manner in the cloud. This is done by creating an object orientated syntax and interpretation environment that can create objects on various distributed locations throughout a network and address them in a scalable, fault tolerant and transparent way. This is followed by a discussion of the problems faced and an outlook into the future. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/28.en.html The Two Envelopes Tent Geerd-Dietger Hoffmann PUBLISH 155@HAR2009@pentabarf.org 155 protheses_for_50_USD Protheses for $50 instead of $250.000 English en 20090813T140000 20090813T150000 01H00M00S Protheses for $50 instead of $250.000 Protheses voor $40 ipv $250.000 In May 2009 the House of Natural Fiber (HONF) from Indonesia was visiting the Netherlands. Their aim: to build cheap leg protheses. They visidet Fablab Amsterdam to build up a comprehensive knowledge base around making protheses and to make contact with experts in the field. Now they are back in Indonesia and applying their knowledge. While a high-tech prothese costs 200.000 Euro and a standard prothese is available for 10.000, the cheapest ones cost $ 150. These are produced and fitted in one day only by Jaipurfoot. Yet HONF's protheses are going to cost a mere $ 50. We will present how HONF have built up their knowledge, what the most relevant experiences were for them to take away. And we will report live from Indonesia how the project proceeds. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/155.en.html The Two Envelopes Tent Peter Troxler PUBLISH 155@HAR2009@pentabarf.org 155 protheses_for_50_USD Protheses for $50 instead of $250.000 englisch en 20090813T140000 20090813T150000 01H00M00S Protheses for $50 instead of $250.000 Protheses voor $40 ipv $250.000 In May 2009 the House of Natural Fiber (HONF) from Indonesia was visiting the Netherlands. Their aim: to build cheap leg protheses. They visidet Fablab Amsterdam to build up a comprehensive knowledge base around making protheses and to make contact with experts in the field. Now they are back in Indonesia and applying their knowledge. While a high-tech prothese costs 200.000 Euro and a standard prothese is available for 10.000, the cheapest ones cost $ 150. These are produced and fitted in one day only by Jaipurfoot. Yet HONF's protheses are going to cost a mere $ 50. We will present how HONF have built up their knowledge, what the most relevant experiences were for them to take away. And we will report live from Indonesia how the project proceeds. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/155.en.html The Two Envelopes Tent Peter Troxler PUBLISH 89@HAR2009@pentabarf.org 89 Public transport SMS ticket hacking englisch en 20090815T200000 20090815T210000 01H00M00S Public transport SMS ticket hacking The primary aim of this presentation is to show a serious inherent vulnerability in the public transport SMS tickets system widely used in many big cities. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/89.en.html The Two Envelopes Tent Pavol Luptak PUBLISH 89@HAR2009@pentabarf.org 89 Public transport SMS ticket hacking English en 20090815T200000 20090815T210000 01H00M00S Public transport SMS ticket hacking The primary aim of this presentation is to show a serious inherent vulnerability in the public transport SMS tickets system widely used in many big cities. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/89.en.html The Two Envelopes Tent Pavol Luptak PUBLISH 157@HAR2009@pentabarf.org 157 Realizing the RFID Guardian English en 20090816T130000 20090816T140000 01H00M00S Realizing the RFID Guardian The RFID Guardian Project is an initiative to put practical open-source HW/SW tools for RFID Security and Privacy into the hands of security consultants and the general public alike. This talk will discuss Radio Frequency Identification, its security and privacy implications, and will provide the newest information about Version 4 of the RFID Guardian, which we intend to launch soon to the general public. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/157.en.html Monty Hall Serge Keyser PUBLISH 157@HAR2009@pentabarf.org 157 Realizing the RFID Guardian englisch en 20090816T130000 20090816T140000 01H00M00S Realizing the RFID Guardian The RFID Guardian Project is an initiative to put practical open-source HW/SW tools for RFID Security and Privacy into the hands of security consultants and the general public alike. This talk will discuss Radio Frequency Identification, its security and privacy implications, and will provide the newest information about Version 4 of the RFID Guardian, which we intend to launch soon to the general public. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/157.en.html Monty Hall Serge Keyser PUBLISH 161@HAR2009@pentabarf.org 161 yro2 Relaunch Bits of Freedom How have digital rights been affected in The Netherlands since 2006? How will Bits of Freedom defend these rights? English en 20090814T160000 20090814T170000 01H00M00S Relaunch Bits of Freedom- How have digital rights been affected in The Netherlands since 2006? How will Bits of Freedom defend these rights? PUBLIC CONFIRMED Lecture https://har2009.org/program/events/161.en.html The Two Envelopes Tent Ot van Daalen PUBLISH 161@HAR2009@pentabarf.org 161 yro2 Relaunch Bits of Freedom How have digital rights been affected in The Netherlands since 2006? How will Bits of Freedom defend these rights? englisch en 20090814T160000 20090814T170000 01H00M00S Relaunch Bits of Freedom- How have digital rights been affected in The Netherlands since 2006? How will Bits of Freedom defend these rights? PUBLIC CONFIRMED Lecture https://har2009.org/program/events/161.en.html The Two Envelopes Tent Ot van Daalen PUBLISH 207@HAR2009@pentabarf.org 207 Remote Barcode Injection 20090814T120000 20090814T130000 01H00M00S Remote Barcode Injection PUBLIC CONFIRMED Lecture https://har2009.org/program/events/207.en.html The Birthday Tent jbe PUBLISH 207@HAR2009@pentabarf.org 207 Remote Barcode Injection 20090814T120000 20090814T130000 01H00M00S Remote Barcode Injection PUBLIC CONFIRMED Lecture https://har2009.org/program/events/207.en.html The Birthday Tent jbe PUBLISH 35@HAR2009@pentabarf.org 35 Results of a Security Assessment of Common Implementation Strategies of the TCP and IP Protocols englisch en 20090815T210000 20090815T220000 01H00M00S Results of a Security Assessment of Common Implementation Strategies of the TCP and IP Protocols Fernando Gont will present the results of a security assessment of the TCP and IP protocols carried out on behalf of the UK CPNI (United Kingdom's Centre for the Protection of National Infrastructure). He will explain the security implications arising from the protocol specifications themselves, and from a number of implementation strategies followed by most of the popular TCP/IP stacks, and will also discuss the new insights that were gained as a result of this project that can help to mitigate the aforementioned issues. Finally, Fernando will provide an overview of the ongoing efforts at the IETF community to incorporate these insights into the corresponding protocol specifications and the ongoing efforts in the vendor community to incorporate these recommendations into popular implementations of the protocols. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/35.en.html Monty Hall PUBLISH 35@HAR2009@pentabarf.org 35 Results of a Security Assessment of Common Implementation Strategies of the TCP and IP Protocols English en 20090815T210000 20090815T220000 01H00M00S Results of a Security Assessment of Common Implementation Strategies of the TCP and IP Protocols Fernando Gont will present the results of a security assessment of the TCP and IP protocols carried out on behalf of the UK CPNI (United Kingdom's Centre for the Protection of National Infrastructure). He will explain the security implications arising from the protocol specifications themselves, and from a number of implementation strategies followed by most of the popular TCP/IP stacks, and will also discuss the new insights that were gained as a result of this project that can help to mitigate the aforementioned issues. Finally, Fernando will provide an overview of the ongoing efforts at the IETF community to incorporate these insights into the corresponding protocol specifications and the ongoing efforts in the vendor community to incorporate these recommendations into popular implementations of the protocols. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/35.en.html Monty Hall PUBLISH 46@HAR2009@pentabarf.org 46 rfid_sniffer_workshop RFID sniffer workshop Assemble your own RFID sniffer and find RFID tags in your wallet English en 20090815T130000 20090815T170000 04H00M00S RFID sniffer workshop- Assemble your own RFID sniffer and find RFID tags in your wallet Assemble your own RFID sniffer and find RFID tags in your wallet PUBLIC CONFIRMED Lecture https://har2009.org/program/events/46.en.html Bike-shed Red Marc Boon PUBLISH 46@HAR2009@pentabarf.org 46 rfid_sniffer_workshop RFID sniffer workshop Assemble your own RFID sniffer and find RFID tags in your wallet englisch en 20090815T130000 20090815T170000 04H00M00S RFID sniffer workshop- Assemble your own RFID sniffer and find RFID tags in your wallet Assemble your own RFID sniffer and find RFID tags in your wallet PUBLIC CONFIRMED Lecture https://har2009.org/program/events/46.en.html Bike-shed Red Marc Boon PUBLISH 163@HAR2009@pentabarf.org 163 rootkits Rootkits are awesome Insider Threat for Fun and Profit englisch en 20090813T170000 20090813T180000 01H00M00S Rootkits are awesome- Insider Threat for Fun and Profit Rootkits are awesome: Insider Threat for Fun and Profit Addressing the insider threat is now rightly recognised as playing a crucial element in improving the security posture of organisations and preventing all kinds of embarrassment. Recent years have seen a growth in all manner of vendors promising panaceas to address ordinary user activities, but what exactly are the solutions offered? In a lot of instances, legitimate rootkits. This talk examines the current state of the insider threat marketplace, the technical solutions to the issues presented, and an actual analysis of user activities in RL and how they may well negate the the promises of vendors and the expectations of security minded organisations. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/163.en.html Monty Hall Mike Kemp PUBLISH 163@HAR2009@pentabarf.org 163 rootkits Rootkits are awesome Insider Threat for Fun and Profit English en 20090813T170000 20090813T180000 01H00M00S Rootkits are awesome- Insider Threat for Fun and Profit Rootkits are awesome: Insider Threat for Fun and Profit Addressing the insider threat is now rightly recognised as playing a crucial element in improving the security posture of organisations and preventing all kinds of embarrassment. Recent years have seen a growth in all manner of vendors promising panaceas to address ordinary user activities, but what exactly are the solutions offered? In a lot of instances, legitimate rootkits. This talk examines the current state of the insider threat marketplace, the technical solutions to the issues presented, and an actual analysis of user activities in RL and how they may well negate the the promises of vendors and the expectations of security minded organisations. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/163.en.html Monty Hall Mike Kemp PUBLISH 169@HAR2009@pentabarf.org 169 runtime_osx_kernel_patching Runtime Kernel Patching on Mac OS X englisch en 20090813T220000 20090813T230000 01H00M00S Runtime Kernel Patching on Mac OS X This talk will focus on rootkit development on Mac OS X. It will cover the basics as well as a couple of (somewhat) new tricks. We will also talk about rootkit detection on Mac OS X. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/169.en.html The Two Envelopes Tent Bosse Eriksson PUBLISH 169@HAR2009@pentabarf.org 169 runtime_osx_kernel_patching Runtime Kernel Patching on Mac OS X English en 20090813T220000 20090813T230000 01H00M00S Runtime Kernel Patching on Mac OS X This talk will focus on rootkit development on Mac OS X. It will cover the basics as well as a couple of (somewhat) new tricks. We will also talk about rootkit detection on Mac OS X. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/169.en.html The Two Envelopes Tent Bosse Eriksson PUBLISH 91@HAR2009@pentabarf.org 91 searchengine_censorship Search engines and censorship The law and politics of the digital horizon English en 20090813T200000 20090813T210000 01H00M00S Search engines and censorship- The law and politics of the digital horizon Search engines and censorship: the law and politics of the digital horizon PUBLIC CONFIRMED Lecture https://har2009.org/program/events/91.en.html Monty Hall Joris van Hoboken PUBLISH 91@HAR2009@pentabarf.org 91 searchengine_censorship Search engines and censorship The law and politics of the digital horizon englisch en 20090813T200000 20090813T210000 01H00M00S Search engines and censorship- The law and politics of the digital horizon Search engines and censorship: the law and politics of the digital horizon PUBLIC CONFIRMED Lecture https://har2009.org/program/events/91.en.html Monty Hall Joris van Hoboken PUBLISH 173@HAR2009@pentabarf.org 173 securing_networks Securing networks from an ISP perspective The role of the JANET CSIRT English en 20090813T220000 20090813T230000 01H00M00S Securing networks from an ISP perspective- The role of the JANET CSIRT As an ISP attempting to secure a large network with 18 million users and 40Gbs link speeds is a challenging task, this talk will discuss how we attempt to make the JANET network a safer place for its users and the Internet. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/173.en.html The Birthday Tent Bradley Freeman PUBLISH 173@HAR2009@pentabarf.org 173 securing_networks Securing networks from an ISP perspective The role of the JANET CSIRT englisch en 20090813T220000 20090813T230000 01H00M00S Securing networks from an ISP perspective- The role of the JANET CSIRT As an ISP attempting to secure a large network with 18 million users and 40Gbs link speeds is a challenging task, this talk will discuss how we attempt to make the JANET network a safer place for its users and the Internet. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/173.en.html The Birthday Tent Bradley Freeman PUBLISH 167@HAR2009@pentabarf.org 167 Side channel analysis and fault injection Is that a smart card in your pocket? English en 20090814T150000 20090814T160000 01H00M00S Side channel analysis and fault injection- Is that a smart card in your pocket? This talk explores the world of side channel analysis and fault injection on smart cards. The basics of side channel analysis are explained and it is demonstrated how a differential power attack works on a (not state of the art) smartcard. Furthermore, I will explain how fault injection is performed using a simple flashlight (and an advanced laser setup). This is a Side channel '101' lecture and should be interesting for anyone with an interest in hardware hacking, crypto and security. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/167.en.html Monty Hall Jasper van Woudenberg PUBLISH 167@HAR2009@pentabarf.org 167 Side channel analysis and fault injection Is that a smart card in your pocket? englisch en 20090814T150000 20090814T160000 01H00M00S Side channel analysis and fault injection- Is that a smart card in your pocket? This talk explores the world of side channel analysis and fault injection on smart cards. The basics of side channel analysis are explained and it is demonstrated how a differential power attack works on a (not state of the art) smartcard. Furthermore, I will explain how fault injection is performed using a simple flashlight (and an advanced laser setup). This is a Side channel '101' lecture and should be interesting for anyone with an interest in hardware hacking, crypto and security. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/167.en.html Monty Hall Jasper van Woudenberg PUBLISH 132@HAR2009@pentabarf.org 132 Side channel analysis on embedded systems englisch en 20090815T130000 20090815T140000 01H00M00S Side channel analysis on embedded systems The presentation briefly introduces the state of the art analysis techniques used on smart cards today. Further, we define the types of embedded systems that these attacks may apply to. Then we illustrate the differences and commonalities of side channel analysis on smart cards and embedded systems. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/132.en.html The Two Envelopes Tent Job de Haas PUBLISH 132@HAR2009@pentabarf.org 132 Side channel analysis on embedded systems English en 20090815T130000 20090815T140000 01H00M00S Side channel analysis on embedded systems The presentation briefly introduces the state of the art analysis techniques used on smart cards today. Further, we define the types of embedded systems that these attacks may apply to. Then we illustrate the differences and commonalities of side channel analysis on smart cards and embedded systems. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/132.en.html The Two Envelopes Tent Job de Haas PUBLISH 139@HAR2009@pentabarf.org 139 smallsister_workshop SmallSister or how to defeat data retention Circumventing bureaucrats English en 20090814T130000 20090814T140000 01H00M00S SmallSister or how to defeat data retention- Circumventing bureaucrats Data retention is one of the biggest dangers of free speech and a free society. Now there is software that at least secures e-mail. The best of all: it's easy to use and fully functional. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/139.en.html Bike-shed Green Brenno de Winter PUBLISH 139@HAR2009@pentabarf.org 139 smallsister_workshop SmallSister or how to defeat data retention Circumventing bureaucrats englisch en 20090814T130000 20090814T140000 01H00M00S SmallSister or how to defeat data retention- Circumventing bureaucrats Data retention is one of the biggest dangers of free speech and a free society. Now there is software that at least secures e-mail. The best of all: it's easy to use and fully functional. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/139.en.html Bike-shed Green Brenno de Winter PUBLISH 128@HAR2009@pentabarf.org 128 Sniffing cable modems English en 20090816T140000 20090816T150000 01H00M00S Sniffing cable modems Cable modems are widely used these days for internet connections or other applications. This talk gives a detailed overview of this mean of communication with a focus on its security. Additionally, I'll show how network forensics can easily be used with this media along with a few new attacks which can now be implemented thanks to the information being gathered. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/128.en.html The Birthday Tent Guy Martin PUBLISH 128@HAR2009@pentabarf.org 128 Sniffing cable modems englisch en 20090816T140000 20090816T150000 01H00M00S Sniffing cable modems Cable modems are widely used these days for internet connections or other applications. This talk gives a detailed overview of this mean of communication with a focus on its security. Additionally, I'll show how network forensics can easily be used with this media along with a few new attacks which can now be implemented thanks to the information being gathered. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/128.en.html The Birthday Tent Guy Martin PUBLISH 51@HAR2009@pentabarf.org 51 statistics_and_law Statistics and the Law The case of Lucia de B., alleged serial killer, and others. englisch en 20090815T160000 20090815T170000 01H00M00S Statistics and the Law- The case of Lucia de B., alleged serial killer, and others. The case of Lucia de B. is a highly controversial legal case in the Netherlands, in which a statistically significant correlation between the presence of a particular nurse and the occurrence of suspicious medical incidents on her ward played a central role in getting her a life conviction for serial murder. However, recent re-investigation of the meagre medical evidence for wrong-doing, and re-investigation of the statistics, makes it very plausible that no murders were committed at all, by anybody. The Dutch supreme court has recently overturned the conviction and a re-trial has started start. However a motto of the Dutch legal system could be "learning represents the possibility of failure and must thus be avoided if possible". Though innocence was obvious (to the well informed), the conviction was legally speaking watertight and irreversible. Yet a small band of "terrorists" (as they were characterized in legal magazines) managed to convince the legal system that this had to change, and change it did. How did they do it? Hacking into a complex human system... use it to make it do the work for you. Slides of the talk: http://www.math.leidenuniv.nl/~gill/Lucia.pdf PUBLIC CONFIRMED Lecture https://har2009.org/program/events/51.en.html The Two Envelopes Tent Richard Gill PUBLISH 51@HAR2009@pentabarf.org 51 statistics_and_law Statistics and the Law The case of Lucia de B., alleged serial killer, and others. English en 20090815T160000 20090815T170000 01H00M00S Statistics and the Law- The case of Lucia de B., alleged serial killer, and others. The case of Lucia de B. is a highly controversial legal case in the Netherlands, in which a statistically significant correlation between the presence of a particular nurse and the occurrence of suspicious medical incidents on her ward played a central role in getting her a life conviction for serial murder. However, recent re-investigation of the meagre medical evidence for wrong-doing, and re-investigation of the statistics, makes it very plausible that no murders were committed at all, by anybody. The Dutch supreme court has recently overturned the conviction and a re-trial has started start. However a motto of the Dutch legal system could be "learning represents the possibility of failure and must thus be avoided if possible". Though innocence was obvious (to the well informed), the conviction was legally speaking watertight and irreversible. Yet a small band of "terrorists" (as they were characterized in legal magazines) managed to convince the legal system that this had to change, and change it did. How did they do it? Hacking into a complex human system... use it to make it do the work for you. Slides of the talk: http://www.math.leidenuniv.nl/~gill/Lucia.pdf PUBLIC CONFIRMED Lecture https://har2009.org/program/events/51.en.html The Two Envelopes Tent Richard Gill PUBLISH 86@HAR2009@pentabarf.org 86 stoned_bootkit Stoned Bootkit The Rise of MBR Rootkits & Bootkits in the Wild English en 20090814T220000 20090814T230000 01H00M00S Stoned Bootkit- The Rise of MBR Rootkits & Bootkits in the Wild Stoned Bootkit is a new Windows bootkit. It is loaded before Windows starts and is memory resident up to the Windows kernel. Thus Stoned is executed beside the Windows kernel and has full access to the entire system. It attacks all Windows versions including XP, Vista and 7. It has exciting features like integrated file system drivers, automatic Windows pwning, plugins, boot applications, and much much more. Inside it is a small operating system! It finally goes back to the roots. So in this way, Your PC is now Stoned! ..again PUBLIC CONFIRMED Lecture https://har2009.org/program/events/86.en.html The Two Envelopes Tent Peter Kleissner PUBLISH 86@HAR2009@pentabarf.org 86 stoned_bootkit Stoned Bootkit The Rise of MBR Rootkits & Bootkits in the Wild englisch en 20090814T220000 20090814T230000 01H00M00S Stoned Bootkit- The Rise of MBR Rootkits & Bootkits in the Wild Stoned Bootkit is a new Windows bootkit. It is loaded before Windows starts and is memory resident up to the Windows kernel. Thus Stoned is executed beside the Windows kernel and has full access to the entire system. It attacks all Windows versions including XP, Vista and 7. It has exciting features like integrated file system drivers, automatic Windows pwning, plugins, boot applications, and much much more. Inside it is a small operating system! It finally goes back to the roots. So in this way, Your PC is now Stoned! ..again PUBLIC CONFIRMED Lecture https://har2009.org/program/events/86.en.html The Two Envelopes Tent Peter Kleissner PUBLISH 174@HAR2009@pentabarf.org 174 Surveillance Self-Defense Teaching the community to defend itself against surveillance englisch en 20090815T200000 20090815T210000 01H00M00S Surveillance Self-Defense- Teaching the community to defend itself against surveillance EFF created the Surveillance Self-Defense project (https://ssd.eff.org) to teach individuals and organisations within the U.S. about legal and technological strategies which can be used to minimise surveillance threats from US government actors. In this talk, we will discuss the lessons from this project and how to adapt or extend them to the European context. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/174.en.html Monty Hall Peter Eckersley PUBLISH 174@HAR2009@pentabarf.org 174 Surveillance Self-Defense Teaching the community to defend itself against surveillance English en 20090815T200000 20090815T210000 01H00M00S Surveillance Self-Defense- Teaching the community to defend itself against surveillance EFF created the Surveillance Self-Defense project (https://ssd.eff.org) to teach individuals and organisations within the U.S. about legal and technological strategies which can be used to minimise surveillance threats from US government actors. In this talk, we will discuss the lessons from this project and how to adapt or extend them to the European context. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/174.en.html Monty Hall Peter Eckersley PUBLISH 171@HAR2009@pentabarf.org 171 internetz_are_pwned Teh Internetz are pwned How I learned to stop worrying and love teh Internetz englisch en 20090813T160000 20090813T170000 01H00M00S Teh Internetz are pwned- How I learned to stop worrying and love teh Internetz Working as an operational Security Officer at an ISP for the better part of a decade brings with it many adventures, challenges, laughs and tears. This talk will cover some of the most recent issues to be causing hair loss to someone who can't afford it. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/171.en.html Monty Hall Scott McIntyre PUBLISH 171@HAR2009@pentabarf.org 171 internetz_are_pwned Teh Internetz are pwned How I learned to stop worrying and love teh Internetz English en 20090813T160000 20090813T170000 01H00M00S Teh Internetz are pwned- How I learned to stop worrying and love teh Internetz Working as an operational Security Officer at an ISP for the better part of a decade brings with it many adventures, challenges, laughs and tears. This talk will cover some of the most recent issues to be causing hair loss to someone who can't afford it. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/171.en.html Monty Hall Scott McIntyre PUBLISH 114@HAR2009@pentabarf.org 114 tempest TEMPEST for the casual election hacker The 80s are calling and want their sploits back English en 20090814T160000 20090814T170000 01H00M00S TEMPEST for the casual election hacker- The 80s are calling and want their sploits back Yes, German NEDAPs have TEMPEST issues too, and we have proof. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/114.en.html Monty Hall Andreas Bogk PUBLISH 114@HAR2009@pentabarf.org 114 tempest TEMPEST for the casual election hacker The 80s are calling and want their sploits back englisch en 20090814T160000 20090814T170000 01H00M00S TEMPEST for the casual election hacker- The 80s are calling and want their sploits back Yes, German NEDAPs have TEMPEST issues too, and we have proof. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/114.en.html Monty Hall Andreas Bogk PUBLISH 156@HAR2009@pentabarf.org 156 censoring_mob The Censoring Mob How Social Media Destroy Freedom of Expression - And Why That Might Be a Good Thing englisch en 20090813T220000 20090813T230000 01H00M00S The Censoring Mob- How Social Media Destroy Freedom of Expression - And Why That Might Be a Good Thing Social media is supposed to foster free speech by creating user-friendly web applications that let people talk, share ideas, and organize online. Instead it has created a new form of censorship, led by mobs who flag content as "inappropriate" to remove it, or who troll their victims out of existence. This talk will explore how these mobs work, what their politics are, and whether we should organize to stop them - or join them. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/156.en.html Monty Hall Annalee Newitz PUBLISH 156@HAR2009@pentabarf.org 156 censoring_mob The Censoring Mob How Social Media Destroy Freedom of Expression - And Why That Might Be a Good Thing English en 20090813T220000 20090813T230000 01H00M00S The Censoring Mob- How Social Media Destroy Freedom of Expression - And Why That Might Be a Good Thing Social media is supposed to foster free speech by creating user-friendly web applications that let people talk, share ideas, and organize online. Instead it has created a new form of censorship, led by mobs who flag content as "inappropriate" to remove it, or who troll their victims out of existence. This talk will explore how these mobs work, what their politics are, and whether we should organize to stop them - or join them. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/156.en.html Monty Hall Annalee Newitz PUBLISH 62@HAR2009@pentabarf.org 62 ethics_of_piracy The Complex Ethics of Piracy Theft, civil disobedience, or something else? englisch en 20090813T210000 20090813T220000 01H00M00S The Complex Ethics of Piracy- Theft, civil disobedience, or something else? The Complex Ethics of Piracy This talk aims to replace the "piracy is good" vs "piracy is theft" debate with a more nuanced understanding. It will investigate when piracy is selfish; when it is civil disobedience; whether it is ever constructive for cultural industries, or whether it is ever, as copyright holders argue, "theft". I will conclude that each of these things is *sometimes* true about piracy, and that simple views are inadequate for understanding the ethical dimension of copyright infringement. Both pirates and copyright industries need to develop more subtle understandings of the morality of file sharing. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/62.en.html Monty Hall Peter Eckersley PUBLISH 62@HAR2009@pentabarf.org 62 ethics_of_piracy The Complex Ethics of Piracy Theft, civil disobedience, or something else? English en 20090813T210000 20090813T220000 01H00M00S The Complex Ethics of Piracy- Theft, civil disobedience, or something else? The Complex Ethics of Piracy This talk aims to replace the "piracy is good" vs "piracy is theft" debate with a more nuanced understanding. It will investigate when piracy is selfish; when it is civil disobedience; whether it is ever constructive for cultural industries, or whether it is ever, as copyright holders argue, "theft". I will conclude that each of these things is *sometimes* true about piracy, and that simple views are inadequate for understanding the ethical dimension of copyright infringement. Both pirates and copyright industries need to develop more subtle understandings of the morality of file sharing. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/62.en.html Monty Hall Peter Eckersley PUBLISH 95@HAR2009@pentabarf.org 95 carrier_grade_nat The dangers (and merits) of carrier grade nat Living in the twilight zone English en 20090814T170000 20090814T180000 01H00M00S The dangers (and merits) of carrier grade nat- Living in the twilight zone As the point of IPv4 address depletion comes nearer it's getting clear the world won't be ready for large scale IPv6 deployment, at the same time expectations are IPv4 will be around for the next 40 years. To circumvent the problems this introduces large scale translation needs to take place to have the old world connect to the new world and make sure enough addresses are available. All these solutions introduce large scale NAT deployments or carrier grade nats. This will introduce the basic mechanisms used, after which you as the audience is inivted to comment on it. Hopefully sparking a discussion about the good anf bad things of these concepts and things people should become aware of. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/95.en.html The Birthday Tent Marco Hogewoning PUBLISH 95@HAR2009@pentabarf.org 95 carrier_grade_nat The dangers (and merits) of carrier grade nat Living in the twilight zone englisch en 20090814T170000 20090814T180000 01H00M00S The dangers (and merits) of carrier grade nat- Living in the twilight zone As the point of IPv4 address depletion comes nearer it's getting clear the world won't be ready for large scale IPv6 deployment, at the same time expectations are IPv4 will be around for the next 40 years. To circumvent the problems this introduces large scale translation needs to take place to have the old world connect to the new world and make sure enough addresses are available. All these solutions introduce large scale NAT deployments or carrier grade nats. This will introduce the basic mechanisms used, after which you as the audience is inivted to comment on it. Hopefully sparking a discussion about the good anf bad things of these concepts and things people should become aware of. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/95.en.html The Birthday Tent Marco Hogewoning PUBLISH 120@HAR2009@pentabarf.org 120 jtag_howto The Embedded JTAG interface HOWTO What's a JTAG interface and how to find it? English en 20090813T160000 20090813T170000 01H00M00S The Embedded JTAG interface HOWTO- What's a JTAG interface and how to find it? This presentation is all about the JTAG interface, commonly found in embedded devices such as (wireless) routers, satellite receivers and coffee machines. It will start with a trip down memory lane: the intended use of the JTAG interface, and why you would like to have access to it. The story continues with a guide on how to find it - visually and electronically. the round-up is how chip manufacturers like to prevent us from getting access. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/120.en.html The Two Envelopes Tent Gerrit van der Bij PUBLISH 120@HAR2009@pentabarf.org 120 jtag_howto The Embedded JTAG interface HOWTO What's a JTAG interface and how to find it? englisch en 20090813T160000 20090813T170000 01H00M00S The Embedded JTAG interface HOWTO- What's a JTAG interface and how to find it? This presentation is all about the JTAG interface, commonly found in embedded devices such as (wireless) routers, satellite receivers and coffee machines. It will start with a trip down memory lane: the intended use of the JTAG interface, and why you would like to have access to it. The story continues with a guide on how to find it - visually and electronically. the round-up is how chip manufacturers like to prevent us from getting access. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/120.en.html The Two Envelopes Tent Gerrit van der Bij PUBLISH 7@HAR2009@pentabarf.org 7 as400_introduction The IBM AS/400 A technical introduction English en 20090814T110000 20090814T120000 01H00M00S The IBM AS/400- A technical introduction This talk is intended for people who say "what the hell is an AS/400, what's so special about it / how does it work?". PUBLIC CONFIRMED Lecture https://har2009.org/program/events/7.en.html The Two Envelopes Tent Tom van Looy PUBLISH 7@HAR2009@pentabarf.org 7 as400_introduction The IBM AS/400 A technical introduction englisch en 20090814T110000 20090814T120000 01H00M00S The IBM AS/400- A technical introduction This talk is intended for people who say "what the hell is an AS/400, what's so special about it / how does it work?". PUBLIC CONFIRMED Lecture https://har2009.org/program/events/7.en.html The Two Envelopes Tent Tom van Looy PUBLISH 134@HAR2009@pentabarf.org 134 power_of_decentralization The power of decentralization Agent-based simulation of a decentralized power network englisch en 20090815T160000 20090815T170000 01H00M00S The power of decentralization- Agent-based simulation of a decentralized power network MADMAX AGAINST THE POWER OF DECENTRALIZATION ============================================ In a world where oil is scarce, violence, chaos and desperation rein. But what about our world without power? Electricity has become vital for all these appliances that make our daily life so enjoyable. Our network, our tellies our fridges and freezers are as dependent on their power supply that we are on them. In this paper, or should we say in this fiction note, we investigate how a citizen based decentralized power system could work and how an auction based bidding system could insentivize people to switch off their devices so that others, more eager to consume, could benefit from their spare capacity. Would the theory of auction, combined with the next generation of micro power sources, restore order in a place where scarcity would otherwise prevail? On a more serious tone, we propose to first summarize what decentralized power means today. We them bring the existing technology to a next hypothetical step where sophisticated appliances are able to communicate with an electronic exchange to make deals, confronting demand with offer. In order to study such a system, we collect realistic data and build a simulator where households are equiped with solar panels, micro-turbines and consumption devices that can potentially postpone or cancel their activity on the basis of a utility function that is tuned by household members to suit their need. The added flexibility is twofold. First, an added power capacity is available due to the endogenous power supply available to the next generation houses. Secondly, as users can tailor their activities, the aggregated consumption pattern is smoothed out potentially leaving room for added efficiency. The contribution of this research is to shed the light on the quantitative figures that make up such a network. What amount of flexibility and more crucially how different should the utility functions be to flatten out the consumption pattern so typical of our current system? PUBLIC CONFIRMED Lecture https://har2009.org/program/events/134.en.html The Birthday Tent Laurent de Wolf Vincent Guffens PUBLISH 134@HAR2009@pentabarf.org 134 power_of_decentralization The power of decentralization Agent-based simulation of a decentralized power network English en 20090815T160000 20090815T170000 01H00M00S The power of decentralization- Agent-based simulation of a decentralized power network MADMAX AGAINST THE POWER OF DECENTRALIZATION ============================================ In a world where oil is scarce, violence, chaos and desperation rein. But what about our world without power? Electricity has become vital for all these appliances that make our daily life so enjoyable. Our network, our tellies our fridges and freezers are as dependent on their power supply that we are on them. In this paper, or should we say in this fiction note, we investigate how a citizen based decentralized power system could work and how an auction based bidding system could insentivize people to switch off their devices so that others, more eager to consume, could benefit from their spare capacity. Would the theory of auction, combined with the next generation of micro power sources, restore order in a place where scarcity would otherwise prevail? On a more serious tone, we propose to first summarize what decentralized power means today. We them bring the existing technology to a next hypothetical step where sophisticated appliances are able to communicate with an electronic exchange to make deals, confronting demand with offer. In order to study such a system, we collect realistic data and build a simulator where households are equiped with solar panels, micro-turbines and consumption devices that can potentially postpone or cancel their activity on the basis of a utility function that is tuned by household members to suit their need. The added flexibility is twofold. First, an added power capacity is available due to the endogenous power supply available to the next generation houses. Secondly, as users can tailor their activities, the aggregated consumption pattern is smoothed out potentially leaving room for added efficiency. The contribution of this research is to shed the light on the quantitative figures that make up such a network. What amount of flexibility and more crucially how different should the utility functions be to flatten out the consumption pattern so typical of our current system? PUBLIC CONFIRMED Lecture https://har2009.org/program/events/134.en.html The Birthday Tent Laurent de Wolf Vincent Guffens PUBLISH 56@HAR2009@pentabarf.org 56 cartoon_quizz The Super Awesome Cartoon Quizz 2009 Test your knowledge on cartoons from past and present English en 20090814T220000 20090814T230000 01H00M00S The Super Awesome Cartoon Quizz 2009- Test your knowledge on cartoons from past and present Quiz with a lot of questions about all sorts of cartoons. Both old and new cartoons will be tested. There are modest prizes to win. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/56.en.html Monty Hall Elger 'Stitch' Jonker PUBLISH 56@HAR2009@pentabarf.org 56 cartoon_quizz The Super Awesome Cartoon Quizz 2009 Test your knowledge on cartoons from past and present englisch en 20090814T220000 20090814T230000 01H00M00S The Super Awesome Cartoon Quizz 2009- Test your knowledge on cartoons from past and present Quiz with a lot of questions about all sorts of cartoons. Both old and new cartoons will be tested. There are modest prizes to win. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/56.en.html Monty Hall Elger 'Stitch' Jonker PUBLISH 40@HAR2009@pentabarf.org 40 zeus_evolution The ZeuS evolution A malware case study.. englisch en 20090813T210000 20090813T220000 01H00M00S The ZeuS evolution- A malware case study.. The talk is intended to give an insight view of todays malware - major players, behavior and institutions involved. The focus will be on one of the main malware family we face today: Zeus / Zbot / Wsnpoem. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/40.en.html The Two Envelopes Tent Clemens Kurtenbach PUBLISH 40@HAR2009@pentabarf.org 40 zeus_evolution The ZeuS evolution A malware case study.. English en 20090813T210000 20090813T220000 01H00M00S The ZeuS evolution- A malware case study.. The talk is intended to give an insight view of todays malware - major players, behavior and institutions involved. The focus will be on one of the main malware family we face today: Zeus / Zbot / Wsnpoem. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/40.en.html The Two Envelopes Tent Clemens Kurtenbach PUBLISH 178@HAR2009@pentabarf.org 178 designcontest (Un)limited design Open Design englisch en 20090813T130000 20090813T140000 01H00M00S (Un)limited design- Open Design (un)limited Design Contest invites anybody -- designers, makers, amateurs -- to submit their own designs in the area of form, fashion and food. Unique about the (un)limited Design Contest is that all designs are open for anybody to be used, re-interpreted and redesigned. These derivative designs are also entitled to take part in the contest -- even more: copying and improving designs is strongly encouraged. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/178.en.html The Two Envelopes Tent Adrian Bowyer Neil Gershenfeld Ronen Kadushin PUBLISH 178@HAR2009@pentabarf.org 178 designcontest (Un)limited design Open Design English en 20090813T130000 20090813T140000 01H00M00S (Un)limited design- Open Design (un)limited Design Contest invites anybody -- designers, makers, amateurs -- to submit their own designs in the area of form, fashion and food. Unique about the (un)limited Design Contest is that all designs are open for anybody to be used, re-interpreted and redesigned. These derivative designs are also entitled to take part in the contest -- even more: copying and improving designs is strongly encouraged. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/178.en.html The Two Envelopes Tent Adrian Bowyer Neil Gershenfeld Ronen Kadushin PUBLISH 190@HAR2009@pentabarf.org 190 (Un)limited design contest - Friday Session Open Design englisch en 20090814T110000 20090814T180000 07H00M00S (Un)limited design contest - Friday Session- Open Design PUBLIC CONFIRMED Lecture https://har2009.org/program/events/190.en.html Bike-shed Yellow Ronen Kadushin PUBLISH 190@HAR2009@pentabarf.org 190 (Un)limited design contest - Friday Session Open Design English en 20090814T110000 20090814T180000 07H00M00S (Un)limited design contest - Friday Session- Open Design PUBLIC CONFIRMED Lecture https://har2009.org/program/events/190.en.html Bike-shed Yellow Ronen Kadushin PUBLISH 191@HAR2009@pentabarf.org 191 (Un)limited design contest - Saturday Session Open Design englisch en 20090815T110000 20090815T150000 04H00M00S (Un)limited design contest - Saturday Session- Open Design PUBLIC CONFIRMED Lecture https://har2009.org/program/events/191.en.html Bike-shed Yellow Ronen Kadushin PUBLISH 191@HAR2009@pentabarf.org 191 (Un)limited design contest - Saturday Session Open Design English en 20090815T110000 20090815T150000 04H00M00S (Un)limited design contest - Saturday Session- Open Design PUBLIC CONFIRMED Lecture https://har2009.org/program/events/191.en.html Bike-shed Yellow Ronen Kadushin PUBLISH 192@HAR2009@pentabarf.org 192 (Un)limited design contest- Sunday Session Open Design englisch en 20090816T110000 20090816T150000 04H00M00S (Un)limited design contest- Sunday Session- Open Design PUBLIC CONFIRMED Lecture https://har2009.org/program/events/192.en.html Bike-shed Yellow Ronen Kadushin PUBLISH 192@HAR2009@pentabarf.org 192 (Un)limited design contest- Sunday Session Open Design English en 20090816T110000 20090816T150000 04H00M00S (Un)limited design contest- Sunday Session- Open Design PUBLIC CONFIRMED Lecture https://har2009.org/program/events/192.en.html Bike-shed Yellow Ronen Kadushin PUBLISH 189@HAR2009@pentabarf.org 189 (Un)limited design contest - Thursday Session Open Design englisch en 20090813T150000 20090813T180000 03H00M00S (Un)limited design contest - Thursday Session- Open Design PUBLIC CONFIRMED Lecture https://har2009.org/program/events/189.en.html Bike-shed Yellow Ronen Kadushin PUBLISH 189@HAR2009@pentabarf.org 189 (Un)limited design contest - Thursday Session Open Design English en 20090813T150000 20090813T180000 03H00M00S (Un)limited design contest - Thursday Session- Open Design PUBLIC CONFIRMED Lecture https://har2009.org/program/events/189.en.html Bike-shed Yellow Ronen Kadushin PUBLISH 138@HAR2009@pentabarf.org 138 unusual_lockpicking Unusual lock picking There's more than five pin tumblers englisch en 20090815T200000 20090815T210000 01H00M00S Unusual lock picking- There's more than five pin tumblers A talk about some not so common, newly developed or unpublished attacks on some special (including maximum security) locks. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/138.en.html The Birthday Tent iggy mh Ray PUBLISH 138@HAR2009@pentabarf.org 138 unusual_lockpicking Unusual lock picking There's more than five pin tumblers English en 20090815T200000 20090815T210000 01H00M00S Unusual lock picking- There's more than five pin tumblers A talk about some not so common, newly developed or unpublished attacks on some special (including maximum security) locks. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/138.en.html The Birthday Tent iggy mh Ray PUBLISH 80@HAR2009@pentabarf.org 80 sputnik_data View from the orbit Sputnik data description and analysis English en 20090814T110000 20090814T120000 01H00M00S View from the orbit- Sputnik data description and analysis This presentation describes analysis of Sputnik data gathered during 24C3 and 25C3. It shows how simple techniques can be used to gather knowledge about previous Congress participants. 24C3 was the second Congress during which Sputnik tracking system was used. Sputnik tags were given new firmware and more stations were deployed this time. Less participants took part in Sputnik experiment than during previous congress, but more data was acquired. During 25C3 tags were equipped with firmware able to detect social interactions, and tags were able to communicate with each other, not only with the system. Techniques described in this talk can also be used in analysing data gathered from other sources, like cellular phones or bluetooth devices. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/80.en.html Monty Hall Tomasz Rybak PUBLISH 80@HAR2009@pentabarf.org 80 sputnik_data View from the orbit Sputnik data description and analysis englisch en 20090814T110000 20090814T120000 01H00M00S View from the orbit- Sputnik data description and analysis This presentation describes analysis of Sputnik data gathered during 24C3 and 25C3. It shows how simple techniques can be used to gather knowledge about previous Congress participants. 24C3 was the second Congress during which Sputnik tracking system was used. Sputnik tags were given new firmware and more stations were deployed this time. Less participants took part in Sputnik experiment than during previous congress, but more data was acquired. During 25C3 tags were equipped with firmware able to detect social interactions, and tags were able to communicate with each other, not only with the system. Techniques described in this talk can also be used in analysing data gathered from other sources, like cellular phones or bluetooth devices. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/80.en.html Monty Hall Tomasz Rybak PUBLISH 126@HAR2009@pentabarf.org 126 webappinsec WebAppInSec : 101 threats The dirty tricks of the black art of WebAppInSec englisch en 20090814T170000 20090814T180000 01H00M00S WebAppInSec : 101 threats- The dirty tricks of the black art of WebAppInSec About different types of (old)web application threats, how to find them and how to exploit them. The dirty tricks of the black art of WebAppInSec. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/126.en.html The Two Envelopes Tent Jacco van Tuijl PUBLISH 126@HAR2009@pentabarf.org 126 webappinsec WebAppInSec : 101 threats The dirty tricks of the black art of WebAppInSec English en 20090814T170000 20090814T180000 01H00M00S WebAppInSec : 101 threats- The dirty tricks of the black art of WebAppInSec About different types of (old)web application threats, how to find them and how to exploit them. The dirty tricks of the black art of WebAppInSec. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/126.en.html The Two Envelopes Tent Jacco van Tuijl PUBLISH 16@HAR2009@pentabarf.org 16 When nerds dream big Nuancing a wireless utopia English en 20090814T200000 20090814T210000 01H00M00S When nerds dream big- Nuancing a wireless utopia This talk will delve into my thesis on the growing criticism of Mark Weiser’s Ubiquitous Computing vision, a twenty year old ideal which still stands at the heart of our craving for location based services, smartphones and self-parking cars. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/16.en.html The Birthday Tent Tijmen Schep PUBLISH 16@HAR2009@pentabarf.org 16 When nerds dream big Nuancing a wireless utopia englisch en 20090814T200000 20090814T210000 01H00M00S When nerds dream big- Nuancing a wireless utopia This talk will delve into my thesis on the growing criticism of Mark Weiser’s Ubiquitous Computing vision, a twenty year old ideal which still stands at the heart of our craving for location based services, smartphones and self-parking cars. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/16.en.html The Birthday Tent Tijmen Schep PUBLISH 33@HAR2009@pentabarf.org 33 why_tor_is_slow Why Tor is slow and what we're doing about it English en 20090814T210000 20090814T220000 01H00M00S Why Tor is slow- and what we're doing about it Many of you have probably tried Tor, and then stopped because you found it too slow. Now that Tor has several hundred thousand users, our original design decisions are showing their age. We need to figure out and deploy some major changes if we want the Tor network to scale up to the million-user mark. Problem #1 is that Tor's congestion control does not work well. We need to come up with ways to let "quiet" streams like web browsing co-exist better with "loud" streams like bulk transfer. Problem #2 is that some Tor users simply put too much traffic onto the network relative to the amount they contribute, so we need to work on ways to limit the effects of those users and/or provide priority to the other users. Problem #3 is that the Tor network simply doesn't have enough capacity to handle all the users that want privacy on the Internet. We need to develop strategies for increasing the overall community of relays, and consider introducing incentives to make the network more self-sustaining. In this talk I'll walk through these problems and more: why we think these are the right problems to solve, and how we're solving them. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/33.en.html The Birthday Tent Roger Dingledine PUBLISH 33@HAR2009@pentabarf.org 33 why_tor_is_slow Why Tor is slow and what we're doing about it englisch en 20090814T210000 20090814T220000 01H00M00S Why Tor is slow- and what we're doing about it Many of you have probably tried Tor, and then stopped because you found it too slow. Now that Tor has several hundred thousand users, our original design decisions are showing their age. We need to figure out and deploy some major changes if we want the Tor network to scale up to the million-user mark. Problem #1 is that Tor's congestion control does not work well. We need to come up with ways to let "quiet" streams like web browsing co-exist better with "loud" streams like bulk transfer. Problem #2 is that some Tor users simply put too much traffic onto the network relative to the amount they contribute, so we need to work on ways to limit the effects of those users and/or provide priority to the other users. Problem #3 is that the Tor network simply doesn't have enough capacity to handle all the users that want privacy on the Internet. We need to develop strategies for increasing the overall community of relays, and consider introducing incentives to make the network more self-sustaining. In this talk I'll walk through these problems and more: why we think these are the right problems to solve, and how we're solving them. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/33.en.html The Birthday Tent Roger Dingledine PUBLISH 160@HAR2009@pentabarf.org 160 wikileaks Wikileaks History is the only guidebook civilization has, but who's the publisher? englisch en 20090813T120000 20090813T130000 01H00M00S Wikileaks- History is the only guidebook civilization has, but who's the publisher? History is the only guidebook civilization has, but who's the publisher? PUBLIC CONFIRMED Lecture https://har2009.org/program/events/160.en.html Monty Hall Daniel Schmitt Julian Assange PUBLISH 160@HAR2009@pentabarf.org 160 wikileaks Wikileaks History is the only guidebook civilization has, but who's the publisher? English en 20090813T120000 20090813T130000 01H00M00S Wikileaks- History is the only guidebook civilization has, but who's the publisher? History is the only guidebook civilization has, but who's the publisher? PUBLIC CONFIRMED Lecture https://har2009.org/program/events/160.en.html Monty Hall Daniel Schmitt Julian Assange PUBLISH 201@HAR2009@pentabarf.org 201 wikileaks-followup Wikileaks -- followup englisch en 20090813T230000 20090814T000000 01H00M00S Wikileaks -- followup PUBLIC CONFIRMED Lecture https://har2009.org/program/events/201.en.html Monty Hall Julian Assange PUBLISH 201@HAR2009@pentabarf.org 201 wikileaks-followup Wikileaks -- followup English en 20090813T230000 20090814T000000 01H00M00S Wikileaks -- followup PUBLIC CONFIRMED Lecture https://har2009.org/program/events/201.en.html Monty Hall Julian Assange PUBLISH 208@HAR2009@pentabarf.org 208 Wikileaks panel 20090814T230000 20090815T000000 01H00M00S Wikileaks panel PUBLIC CONFIRMED Lecture https://har2009.org/program/events/208.en.html The Birthday Tent PUBLISH 208@HAR2009@pentabarf.org 208 Wikileaks panel 20090814T230000 20090815T000000 01H00M00S Wikileaks panel PUBLIC CONFIRMED Lecture https://har2009.org/program/events/208.en.html The Birthday Tent PUBLISH 140@HAR2009@pentabarf.org 140 wok_the_wob WokTheWob: FOIA for open source Experiences of a transparancy nightmare English en 20090815T150000 20090815T160000 01H00M00S WokTheWob: FOIA for open source- Experiences of a transparancy nightmare Many countries have a Freedom of Information Act. People can request transparency from their government in theory. But in practice bureaucrats are going out of their way to prevent 'open' from happening until they meet you. Based on experiences of an ethousiastic wobber you can learn how wobbing works in the Netherlands, what resistance you can expect and how you crack open those archives you already pay for. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/140.en.html The Birthday Tent Brenno de Winter PUBLISH 140@HAR2009@pentabarf.org 140 wok_the_wob WokTheWob: FOIA for open source Experiences of a transparancy nightmare englisch en 20090815T150000 20090815T160000 01H00M00S WokTheWob: FOIA for open source- Experiences of a transparancy nightmare Many countries have a Freedom of Information Act. People can request transparency from their government in theory. But in practice bureaucrats are going out of their way to prevent 'open' from happening until they meet you. Based on experiences of an ethousiastic wobber you can learn how wobbing works in the Netherlands, what resistance you can expect and how you crack open those archives you already pay for. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/140.en.html The Birthday Tent Brenno de Winter PUBLISH 175@HAR2009@pentabarf.org 175 dakami x509 is considered harmful You will be amazed englisch en 20090814T200000 20090814T210000 01H00M00S x509 is considered harmful- You will be amazed PUBLIC CONFIRMED Lecture https://har2009.org/program/events/175.en.html The Two Envelopes Tent Dan Kaminsky PUBLISH 175@HAR2009@pentabarf.org 175 dakami x509 is considered harmful You will be amazed English en 20090814T200000 20090814T210000 01H00M00S x509 is considered harmful- You will be amazed PUBLIC CONFIRMED Lecture https://har2009.org/program/events/175.en.html The Two Envelopes Tent Dan Kaminsky PUBLISH 116@HAR2009@pentabarf.org 116 your_mind Your Mind: Legal Status, Rights and Securing Yourself English en 20090815T170000 20090815T180000 01H00M00S Your Mind: Legal Status, Rights and Securing Yourself As a participant in the information economy, you no longer exclusively own material originating from your organic brain; you leave a digital trail with your portable device’s transmitted communications and when your image is captured by surveillance cameras. Likewise, if you Tweet or blog, you have outsourced a large portion of your memory and some of your active cognition to inorganic systems. U.S. and International laws relating to protection of intellectual property and criminal search and seizure procedures puts into question protections of these ephemeral communications and memoranda stored on your personal computing devices, in cloud computing networks, on off-shore "subpoena proof" server/jurisdiction-hopping platforms, or on social networking sites. Although once considered to be futuristic technologies, as we move our ideas and memories onto external devices or are subjected to public surveillance with technology (Future Attribute Screening Technology) that assesses pre-crime thoughts by remotely measuring biometric data such as heart rate, body temperature, pheromone responses, and respiration, where do our personal privacy rights to our thoughts end and, instead, become public expressions with lesser legal protections? Similarly, at what state does data in-transit or stored in implantable medical devices continuously connected to the Internet become searchable? In a society in which there is little differentiation remaining between self/computer, thoughts/stored memoranda, and international boundaries, a technology lawyer/computer science professor and a security professional will recommend propositions to protect your data and yourself. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/116.en.html The Birthday Tent James "Myrcurial" Arlen Tiffany Strauchs Rad PUBLISH 116@HAR2009@pentabarf.org 116 your_mind Your Mind: Legal Status, Rights and Securing Yourself englisch en 20090815T170000 20090815T180000 01H00M00S Your Mind: Legal Status, Rights and Securing Yourself As a participant in the information economy, you no longer exclusively own material originating from your organic brain; you leave a digital trail with your portable device’s transmitted communications and when your image is captured by surveillance cameras. Likewise, if you Tweet or blog, you have outsourced a large portion of your memory and some of your active cognition to inorganic systems. U.S. and International laws relating to protection of intellectual property and criminal search and seizure procedures puts into question protections of these ephemeral communications and memoranda stored on your personal computing devices, in cloud computing networks, on off-shore "subpoena proof" server/jurisdiction-hopping platforms, or on social networking sites. Although once considered to be futuristic technologies, as we move our ideas and memories onto external devices or are subjected to public surveillance with technology (Future Attribute Screening Technology) that assesses pre-crime thoughts by remotely measuring biometric data such as heart rate, body temperature, pheromone responses, and respiration, where do our personal privacy rights to our thoughts end and, instead, become public expressions with lesser legal protections? Similarly, at what state does data in-transit or stored in implantable medical devices continuously connected to the Internet become searchable? In a society in which there is little differentiation remaining between self/computer, thoughts/stored memoranda, and international boundaries, a technology lawyer/computer science professor and a security professional will recommend propositions to protect your data and yourself. PUBLIC CONFIRMED Lecture https://har2009.org/program/events/116.en.html The Birthday Tent James "Myrcurial" Arlen Tiffany Strauchs Rad