bsideslondon 2016 June 8, 2016 to June 8, 2016, london,uk

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Is TOR/I2P traffic bad for your site? Ben herzberg There seems to be a confusion around the "Cyber" market revolving anonymized traffic. We researched ...
Offensive Anti-Analysis Holly Williams A talk about options advanced attackers can deploy to beat behavioural malware analysis through the ...
Opsec for hackers Porthunter This talk will demonstrate how military strategy can be applied to information and operational security.
LoRa the Explorer - Attacking and Defending LoRa systems Robert Miller LoRa is a Low Powered Wide Area Network (LPWAN) solution designed to enable smart city ...
Open Source Malware Lab Robert Simmons The landscape of open source malware analysis tools improves every day. A malware analysis lab ...
Workshop 1- Session 1 Using R for analysing security data Steph Locke We need to get the most out of the data available to us. R is ...
What does the Apple Watch watch (or why would an attacker care if you wear Android Wear) Sam Phelps Wearable technology is introducing an ever increasing amount of sensors into our daily lives, allowing ...
Introduction to hacking video games Elliot Ward I would to provide an introduction into why someone would want to hacking video games, ...
Bytes between the lines: Hidden data in plain sight. Shlomie Liberow Whilst building an android app to aid users in parking ticket appeals, I collected parking ...
Workshop 3- Session 2: Boot to Rooting - Attacking Vulnerable VMs Vulnhub The workshop aims to provide a methodology which can be used when attacking vulnerable machines. ...
Taking honeypots from research to corporate value Andrew Waite Honeypots are regularly used from a research perspective, but often seen as either limited corporate ...
Bug hunting with Static Code Analysis Nick jones How do we make application security assessments more efficient? Finding and fixing security issues just ...
Honeypots and Deceptive Operations: Can you catch more spies with honey(pots)? David Chismon Detecting advanced (or just effective) attackers on internal networks is the subject of much research ...
Social Engineering for Dummies Callan Garratley The Who, What, Where and When of Social Engineering. Covering a series of the definitions ...
Incident Triage; Applying the Checklist Manifesto in high-stress situations Jon Medvenics The talk is aimed at outlining the methodology of the Checklist Manifesto (Atul Gawande, 2011), ...
Workshop 1- Session 2&3 - Mock Interviews Ben Dewar-powell Ben and Co. will be running "Mock interviews" in slots of 15 mins . Roughly ...
Malware Mythbusting - Lies, Damn Lies and Linguistics Carl Gottlieb Cutting through the FUD of the Anti-Malware industry to expose some home truths about the ...
Getting better with data Steph Locke So many alerts and dashboards, so little time. It's incredibly tough to know what to ...
Naughty Toys For Wicked Girls And Boys Steve Lord Fight Club's Tyler Durden once said, "one can make all kinds of explosives using simple ...
Pwning the Micro:Bit. Edmond Locard Got your hands on a Micro:Bit yet? In this short talk, we'll cover where the ...
Workshop 3- Session 3: Up and running with Dradis Community v3.1 Daniel P. Martin Over the last year there's been a lot of spit and polish going on in ...
Workshop 2 - Session 3: Glitch attacks against embedded systems Robert Miller , Joel Clark Clock glitches let attackers exploit applications through the hardware they are running on, letting them ...
Exploiting Web Application Obscurity Rohan Durve I'd like to present a talk and material on less frequently exploited vulnerabilities such as ...
Investigation & Analysis of Phishing Scams in Ireland Oxana Sereda Phishing attacks have been used by criminals for years and they still remain as an ...
Cyber by any other name would smell as insecure: the language of security Jessica Barker The language of security is something which divides and delights us. ‘Cyber’ is rejected and ...
iOS malware: myth or reality? Julien Bachmann The end of 2015 was filled with a growing number of news about mobile malware ...
Take a step back John Moss Logic Flaws seem to be the often forgotten vulnerability missed by many technical vulnerability scanners ...
How I travelled from retail to InfoSec, the long way round Lee Munson Qualifications: none Certifications: none Experience: none Technical skills: none Did any of these disadvantages stop ...
Workshop 1 Session 4 - Personality Types in Security Culture Kai Roer This interactive workshop looks at how personality types impacts security: how some personality types may ...
honeyHoax - A centralised honeypot Jordan Constantine Honeypots and IDSÍs can be an invaluable security mechanism with respect to obtaining intelligence on ...
Emerald City of Cyber Security Ben herzberg NOTE: This session requires special goggles, which we will hand out prior to its beginning ...
OSTrICa – Open Source Threat Intelligence Collector – An OpenSource plugin-oriented framework to collect Threat Intelligence Information Roberto Sponchioni Current approaches to protect sensitive data, such as Intrusion Detection Systems, Anti-Virus programs, traditional Incident ...
Workshop 2- Session 4: Bug Sweeping like a boss Richard J. Brain , Kirsty Thomson In this 1 hour workshop the team will cover core physical countermeasures equipment. The aim ...
Docker: Security Myths, Security Legends Rory Mccune You can't have helped seeing the rise of containerization in general and Docker specifically in ...