BSidesPortland 2015 Oct. 16, 2015 to Oct. 17, 2015, portland,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Mike Ossmann presenting "Your Ideas are Worthless" Michael Ossmann is a wireless security researcher who makes hardware for hackers. Best known for the open ...
Scared Poopless – LTE and *your* laptop Mickey Shkatov , Jesse Michael With today’s advancement in connectivity and internet access using 3G and LTE modems it seems ...
Hijacking .NET Application Control Flow Topher Timzen This talk will demonstrate attacking .NET applications at runtime. I will show how to modify ...
Security for non-Unicorns Ben Hughes Security is becoming quite the thing now days, everyone wants to have one of them. ...
Ninja Correlation of APT Binaries Bhavna Soman Knowledge and identification of Malware binaries is a crucial part of detection and incident response. ...
reverse reverse engineering Richö Butts Richo will walk attendees through the basic architecture of a traditional AOT compiler and runtime ...
Attacking Hypervisors via Firmware and Hardware Yuriy Bulygin , Oleksandr Bazhaniuk , Alexander Matrosov , Mikhail Gorobets In this presentation, we explore the attack surface of modern hypervisors from the perspective of ...
Putting the x & y into SELinux Josh Scott SELinux is one of the most often ignored and misunderstood security technologies available on the ...
World War Neocities: Providing free web sites to a hostile internet Kyle Drake I built Neocities to bring back the idea of people making their own free web ...
BYOL to elementary school Finn Rutis We wanted more technology in our 5th grade classroom and the school district had spare ...
NSA Playset: Bridging the Airgap without Radios Michael The NSA ANT catalog contains a number of hardware implants that enable communication, command and ...
Jtagsploitation: JTAG to Root, 5 Ways Joe Fitzpatrick , Matt JTAG comes up in nearly every hardware-related hack. In order to do anything via JTAG, ...
Tunnel Vision Shadejinx DNS Tunnels are teh new hotness for persistence. Here's how to spot them!
The State of Bug Bounty Leif Dreizler 2015 saw unprecedented participation in crowdsourced bug bounty programs, as big technology vendors like Google, ...
Distributing The Reconstruction Of High-level Intermediate Representation For Large Scale Malware Analysis Rodrigo Rubira Branco , Gabriel negreira Barbosa , Eugene Rodionov , Alexander Matrosov Malware is acknowledged as an important threat and the number of new samples grows at ...
The Linux Audit Framework Gary Smith The Linux audit framework as shipped with many Linux distributions system provides a framework that ...