BSidesVienna 2015 Nov. 21, 2015 to Nov. 21, 2015, Vienna,Austria

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Cryptography tools, identity vectors for djihadists Julie Gommes Cryptography, social networks, today the use of online tools and serving to protect their communications ...
Digital Supply Chain: The Exposed Flank David C. Lewis This talk will speak to the issues pertaining to supply chain security as is relates ...
Pole Vaulting over Agile Security Pits Daniel Liber Talking about Agile security has been going on for 10 years or so now, including ...
Privilege Escalation via Client Management Software Matthias Deeg Software products requiring high privileges, usually administrative rights, in order to perform their functions are ...
A case study on the security of application whitelisting René Freingruber Application whitelisting is a concept which can be used to further harden critical systems such ...
ZigBee Smart Homes - A Hacker's Open House Tobias Zillner ZigBee is one of the most widespread communication standards used in the Internet of Things ...
Forensics at Scale Martin Schmiedecker Recently a number of open-source tools have been published that allow the timely acquisition and ...
The AWS Survival Guide Philipp Krenn AWS provides a vast amount of services — some are made explicitly for security purposes ...
Incident Handling Automation with intelmq Aaron Kaplan , Sebastian Wagner , Otmar Lendl Spam sending devices, botnet drones, scanners, c&c servers, compromised servers, DDoS infrastructures, phishing websites - ...
Mess with the web Alexander Inführ In the talk I will talk about the problems of PDFs in the context of ...
OSSEC-HIDS Theresa Logfile Analysis is the staff of life of every sysadmin or developer. You have to ...
Writing your first windows exploit in less than one hour - Workshop Klaus Gebeshuber Starting with some basics about stack layout, function calling, buffer overflows, overwriting return addresses and ...
Steganography in File-system Metadata Sebastian Neuner I present you a new technique to hide data in file system metadata, in particular ...
Practical Invalid Curve Attacks on TLS-ECDH Ing Juraj Somorovsky Elliptic Curve Cryptography (ECC) is based on cyclic groups, where group elements are represented as ...
The Fuzzing Project – one year later Hanno Böck Last year I started the Fuzzing Project as a coordinated effort to fuzz free software ...
La Quadrature Du Cercle – The APTs That Weren’t Marion Marschalek For more than two decades classical threat detection has painted the world black and white. ...
The Psychology of Security Stefan Schumacher IT Security is often considered to be a technical problem. However, IT Security is about ...
Combinatorial Security Testing Dimitris e. Simos , Bernhard Garn In this talk, we give an overview of "Combinatorial Security Testing (CST)", a recently established ...
KCI-based Man-in-the-Middle Attacks against TLS Clemens Hlauschek Transport Layer Security (TLS) is the most important standard to secure communication cryptographically on the ...