BSidesCanberra 2018 April 13, 2018 to April 13, 2018, Canberra, Australia

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Special Redacted N/a N/A
"Spectre and Meltdown: Speculative Execution Considered Harmful" Yuval Yarom Spectre and Meltdown are two recently disclosed attacks that exploit a vulnerability in speculative execution, ...
AWS Serverless Exploitation Public Attack Vectors Matt Flannery Functions-as-a-Service (FaaS) is an emerging application architecture quickly replacing traditional monolothic application architecture. Applications are ...
BSides Entertainment System - Wearable gaming but your princess is in another castle Peter Just before Christmas 1995, mum purchased a Nintendo Entertainment System and asked “how long should ...
Introduction to Cisco IOS analysis Adrian Justice 2015 saw the discovery of SYNful Knock, the first known instance of malware for Cisco ...
Tech Keynote: "Making the most of your Hard(ware) work" Joe Fitzpatrick It's true. Hardware is hard, and the cards are stacked against it. Longer dev cycles, ...
"The Count's A-to-Z of Windows Privilege Esclation" Lukasz Gogolkiewicz This talk is a humorous view into the art of escalating ones privileges within a ...
Contactless Access Control 2: Life, uh, finds a way Ryan & Jeremy Have you ever spent days waiting to clone the right card to get (back) into ...
"Get-GPTrashFire: Identifying and Abusing Vulnerable Configurations in MS AD Group Policy" Mike Loss AD Group Policy is a very big gun, and admins shoot themselves in the foot ...
"How much can commodity hardware help on closing microarchitecture timing channels?" Qian Ge We investigate how different categories of microarchitectural state on recent ARM and x86 processors can ...
"Zero clients in the enterprise - Skating on THIN ice" Eldar Marcussen The use of thin, ultra thin and zero clients are on a rapid rise across ...
"It's a UNIX System - Intel ME, JTAG and FOSS BIOSes" James "ec0" Hebden In this talk I will explain the current threats to security and freedom presented by ...
"A Wolf Among the Crowd" Nilesh Kapoor Unbeknown to them, a lone hacker has gained physical access to their secure office. Sitting ...
"Demystifying SharePoint Security" Michael Skelton A SharePoint security talk taking the perspective of an attacker, penetration tester or internal administrator ...
"Microarchitectural attacks: reflecting on 45 years of research since 'A note on the confinement problem'" Paul Harvey 2018 started with Meltdown and Spectre, some of the most difficult and expensive industry-wide vulnerabilities ...
"Hacking Deterministic Bitcoin Addresses" Michael Mckinnon Bitcoin addresses are generated using Elliptic Curve cryptography, specifically secp256k1, which until Bitcoin started, wasn't ...
Tech keynote: "Cyberwar before there was Cyber: Hacking WWII Electronic Bomb Fuses" Peter Gutmann While the Allies went to war with mechanical and chemical bomb fuses whose origins dated ...
"Operation Luigi: How I hacked my friend without her noticing" "alex" Yep so I asked my friend if I could hack her and she said yes. ...
"unrubby: reversing bytecode for the lazy" Richö Butts Obfuscating code is typically the domain of native code, or at least statically dispatched bytecode ...
"Freedom of Information - Hacking the Human Black Box" Elliott Brink FOIA (otherwise known as the Freedom of Information Act or FOI/Freedom of Information in Australia) ...
"Low-Tech Answers to High Security Locks - Keying the Lockwood V7" Oliver Clayton The Lockwood V7 is a well known high-security lock. The interesting pin setup coupled with ...
"That's Not How This Works" Sharrow N/A
"Secure Corroding with Rust" Cameron Ford We all want to make our programs more secure and thankfully we have things to ...
"Gaming Anticheat" Marisa As long as there have been multiplayer games online, there have been cheaters. Where there ...
"Contain Yourself!" Zemmi Contain Yourself! is a talk some of the hard lessons I’ve learned running Docker and ...
"seL4 & Family: Fast, Trustworthy, Cheap, Deployed" Ihor Kuz Since the breakthrough of the world’s first formally verified OS kernel in 2009, seL4 has ...
BSides Canberra Panel N/a N/A