Defcon
Defcon 21 – Privacy In DSRC Connected Vehicles
Description: To date, remote vehicle communications such as OnStar have provided little in the way of privacy. The planned DSRC system…
Read More »Defcon 21 – Phantom Network Surveillance UAV / Drone
Description: DARPA, 2011, sponsored a contest named UAVForge which challenged teams to build a prototype unmanned aerial vehicle (UAV). Mission: “UAV…
Read More »Defcon 21 – Safety of Tor Network Look at Network Diversity, Relay Operators & Malicious Relays
Description: Rumor has it that the Tor network is a CIA honeypot, that all relays are malicious, and that only bad…
Read More »Defcon 21 – A Password is Not Enough: Why Disk Encryption is Broken and How We Might Fix It
Description: Since the publication of the cold boot attack on software disk encryption 5 years ago, there has been little progress…
Read More »Defcon 21 – Google TV or: How I Learned to Stop Worrying and Exploit Secure Boot
Description: Google TV is intended to bring the Android operating system out of the mobile environment and into consumers’ living rooms.…
Read More »Defcon 21 – Protecting Data with Short-Lived Encryption Keys and Hardware Root of Trust
Description: The US National Security Agency has been public about the inevitability of mobile computing and the need to support cloud-based…
Read More »Defcon 21 – ACL Steganography – Permissions to Hide Your Porn
Description: Everyone’s heard the claim: Security through obscurity is no security at all. Challenging this claim is the entire field of…
Read More »Defcon 21 – From Nukes to Cyber— Alternative Approaches for Proactive Defense and Mission Assurance
Description: In typical military operations, the advantage goes to the offense because the initiator controls the timing and is able…
Read More »Defcon 21 – The Politics of Privacy and Technology: Fighting an Uphill Battle
Description: In the past few decades the world has been dramatically transformed by technology. People have significantly evolved in how…
Read More »Defcon 21 – Defeating Internet Censorship with Dust, the Polymorphic Protocol Engine
Description: The greatest danger to free speech on the Internet today is filtering of traffic using protocol fingerprinting. Protocols such…
Read More »Defcon 21 – A Password is Not Enough: Why Disk Encryption is Broken and How We Might Fix It
Description: Since the publication of the cold boot attack on software disk encryption 5 years ago, there has been little…
Read More »Defcon 21 – Google TV or: How I Learned to Stop Worrying and Exploit Secure Boot
Description: Google TV is intended to bring the Android operating system out of the mobile environment and into consumers’ living…
Read More »Defcon 21 – Protecting Data with Short-Lived Encryption Keys and Hardware Root of Trust
Description: The US National Security Agency has been public about the inevitability of mobile computing and the need to support…
Read More »Defcon 21 – ACL Steganography – Permissions to Hide Your Porn
Description: Everyone’s heard the claim: Security through obscurity is no security at all. Challenging this claim is the entire field…
Read More »DEFCON 21 – PROLIFERATION
Description: Ambassador Joseph DeTrani was named President of the Intelligence and National Security Alliance (INSA) on February 5, 2013. As President,…
Read More »