Session
Fahrplan rc3
IT-Security

Tut mal kurz weh – Neues aus der Gesundheits-IT

The Boys are back in Town: Dieses Jahr haben sich Tschirsich und Saatjohann zusammengetan und zeigen euch unter medizinischer Aufsicht von cbro den Zustand des deutschen vernetzten Gesundheitswesen.
Es erwartet euch eine Reise in die unendeckten Welten der Praxis-Serverschränke, da wo seit Jahren schon Millionen Patientendaten darauf warten ins Internet freigelassen zu werden. Hier, wo es keine verbindlichen technischen Richtlinien gibt, wo das Gesetz der IT-Sicherheits-Straße zählt: 'Sicher' ist, wenn nicht drüber berichtet wird. Aber auch da wo es strenge Normen und Regeln gibt, da wo die Öffentlichkeit hin schaut, passieren Dinge: Sicherheits-Protokolle werden mit der heißen Nadel gestrickt, Daten werden an die ganze Welt gespendet, und eine Kontaktverfolgung möchte in das öffentliche Internet.

Additional information

Type Talk
Language German

More sessions

12/27/20
IT-Security
Max Aliapoulios
rC2
Ransomware is a type of malware that encrypts the files of infected hosts and demands payment, often in a cryptocurrency such as Bitcoin. In this talk, we present a measurement framework that we used to perform a large-scale, two-year, end-to-end measurement of ransomware payments, victims and operators.
12/27/20
IT-Security
Thomas Roth
rC2
On November 13., Nintendo launched its newest retro console, the Nintendo Game and Watch - but by then it was already hacked! In contrast to the other Nintendo classic consoles (NES & SNES), Nintendo upped their game this time: A locked processor, AES-CTR encrypted flash & co. made it significantly harder to hack it, but in the end it was still hacked - one day before release. This talk walks through the whole process of opening it up, exploiting the firmware up to bringing homebrew to a new ...
12/27/20
IT-Security
Florian Schweitzer
chaosstudio-hamburg
Ein Klick auf einen "Unsubscribe"-Link in einem Newsletter reicht oft aus, damit ein Angreifer eine Rufumleitung bei einer Zielperson einrichten kann. Damit lassen sich etwa die Passwörter von mit der Rufnummer verknüpften Google- oder Microsoft-Accounts zurücksetzen.
12/27/20
IT-Security
chaosstudio-hamburg
Load Value Injection (LVI) is a new class of transient-execution attacks exploiting microarchitectural flaws in modern processors to inject attacker data into a victim program and steal sensitive data and keys from Intel SGX, a secure vault in Intel processors for your personal data.
12/27/20
IT-Security
rC1
After the first unsuccessful deployment of voting machines in Germany about ten years ago, elements of electronic voting have reached elections again. Although there is now still a paper-trail, more and more essential steps, such as counting the votes, are moved into electronic systems. This change in the ballot-counting procedure took place mostly unnoticed by the public. We are two very concerned election workers who present our first-hand experience in this talk. We show that the current ...
12/28/20
IT-Security
jiska
rC2
How secure is the interface between baseband chips and iOS? While this interface should protect against escalations from the baseband into operating system components, its implementation is full of bugs. Fuzzing this interface is not only relevant to security, but also results in various funny effects, since the iPhone looses information about its identity and location, and eventually ends up in a state with a few thousand unread SMS that can no longer be deleted.
12/28/20
IT-Security
Alisa Esage
rC2
State-of-the-art report on Qualcomm DIAG diagnostic protocol research, its modern implementation as it appears in Hexagon basebands, advanced harnessing and reverse-engineering on modern off-the-shelf smartphones.