BSidesROC 2107 April 22, 2107 to April 22, 2107, rochester,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Insecure Design Patterns in IoT M. Carlton This talk will explore vulnerabilities resulting from insecure design patterns in internet-connected embedded devices using ...
Attacking Modern SaaS Companies Sean Cassidy Modern software-as-a-service (SaaS) companies have a large footprint and a lot of automation which enables ...
Reverse Engineering Techniques for Game Hacking Nick Collisson Reverse engineering is an integral part of PC game cheat development. Since game hacks frequently ...
Real Security Incidents, Unusual Situations Adam Dean The pace of databreaches has reached epic proportions. Organizations large and small, in every industry ...
Following HummingBad Feixiang He The presentation reveals an ongoing research (started about a year ago) of a family of ...
The Hardest CTF I’ve Ever Done: My Experiences Reverse Engineering an MMORPG Dave Kukfa MMORPGs provide countless hours of entertainment by allowing gamers to escape into exciting virtual worlds ...
Insecure Obsolete and Trivial: The Real IOT Price Mcdonald , Justin Berry Over the last few years Hardware Hacking has become a much more prevalent testing and ...
Defeating Application Defenses Through XSS Matt Metzger A live demonstration of how a single Cross Site Scripting vulnerability can be exploited to ...
Decoder Improved: An Improved Burp Suite Decoder Justin Moore Burp Suite is great. Burp Suite’s decoder is not so great. I’ve written a Burp ...
The Guild: The Rise and Fall Future of Syracuse’s Hackerspace Mo Morsi This talk will give a complete history of the Syracuse Innovators Guild, Syracuse’s first hacker ...
Robust Defense For The Rest of Us Russell Mosley , Ryan St. Germain While browsing CFP’s for conferences this summer, one speaking track named “The Art of Defense” ...
Whose Idea Was That? Comparing Security Curriculums and Accreditations To Industry Needs Chaim Sanders , Rob Olson Security is hard but security education may be harder. Few academic institutions have the skills ...
Responding to Cyber Attack at Machine Speed Duncan Sparrell Cyber-attacks are increasing in terms of sophistication, speed and dynamics. Advanced cyber actors (and even ...
Get Low (To all STC STC STC STC) Jon Szymaniak Tired of the pedestrian convenience offered by high level languages? Want to role your own ...
Problems With Elliptic Curves In TLS and SSH Joe Testa This presentation examines the elliptic curve parameters standardized by NIST in FIPS 186-2, which are ...
How I Broke Into Your Datacenter Valerie Thomas Each year companies spend thousands of dollars on sophisticated security systems to ensure their secrets ...
Data Breach Response: Why Communication Fails Claire Tills Organizations don’t seem to be improving their data breach response despite how many failures we ...
Common Developer Crypto Mistakes (with illustrations in Java) Kevin W. Wall During the past 7 years, Kevin has examined how cryptography has been used in close ...
Systematic Network Security Troubleshooting (pcaps or gtfo) Jason Woodson Network security can involve a variety of complex technologies and disciplines, often managed by separate ...
Here We Go Again - A PenTester’s Year in Review Tyler Wrightson In this talk Tyler reviews the interesting, hilarious, unique, awesome and familiar things that happened ...
It’s Time to Innovate for Cyber Defense (How to Out-Hack the Cyber Cracker) Ernest Y. Wong Innovation is critical to improvements within our society and is a key component in the ...
How Bad Is My DIY Password Manager? D. Joe Lastpass, 1password, keepass, feh. How I put my digital life at risk by combing simple ...
DNS Unbound Matt Arnold This talk will give an overview of the unbound DNS server and the security and ...