BSidesKnoxville 2018 May 18, 2018 to May 18, 2018, Knoxville, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
No True Security Person - Balkanization of the Security Community Kate Pearce We talk about "the security community", but there is not one, but many that clash ...
Containerization: a new Compartmentalization for Information Security Corey Mcreynolds Despite how very different a container is from a virtual machine(VM), that comparison is the ...
Tap, Tap, Is This Thing On? Testing EDR Capabilities Michael Haag Many organizations and defenders are deploying EDR products. No one seems to be talking about ...
Thinking outside the security box: Assembling non-traditional security teams Jay Paz In an environment where traditional security professionals are scarce, I have taken a different approach ...
HTTP/2 Magic with Merlin Russel Van Tuyl HTTP/2 is a protocol that increases efficiency and overcomes shortfalls of the HTTP/1 protocol and ...
The differences and niches in the different major criminal undergrounds Stephen Hilt Trend Micro's FTR team is known experts on the workings of the underground marketplaces and ...
Death, Dealing, and Digital Forensics Kyle Bubp Death. It's inevitable, yet we never plan for it. When it does happen, how do ...
The Art and Science of Herding Cats (How to Keep Users from Clicking Stuff) John Helt As a recent "Cat Daddy" of two kittens, I have noticed some interesting parallels in ...
Deadly Lag - Behavioral Security, ARMA3, UDP, Bad Packets and Dead People Travis Palmer Do you like cheating at video games? I sure don't, that's utterly reprehensible. That being ...
KEYNOTE: Security as a Product Kelly Shortridge Enterprise security teams too often are relegated to performing as firefighting, headless chickens – which ...
SSnO-nos: Finding and exploiting common OAuth pitfalls Matthew Van Gundy With OAuth, you can use a single identity with multiple web apps and securely delegate ...
Can you hide from Big Data? James Harrell In today’s interconnected world of Facebook, Twitter, and LinkedIn it can be easy to miss ...
Mobile Application Privacy and Analytics Kevin Cody I spend my days reviewing source code and dynamic run times of mobile applications from ...
Hacking RFID Video Games the Crazy Way Brandon Wilson A technical and personal recollection of how I hacked the first multi-platform RFID video game, ...
Full Auto OSINT Adam Len Compton "Do you need to perform a social engineering attack but have no targets? Are you ...
A Good Watch for Radio and Reverse Engineers Travis Goodspeed Late last year, I cloned the Casio 3208 calculator watch module with an open design, ...
Just Let Yourself In David Boyd Social Engineering is eveywhere. In this talk, I will discuss three different real world Security ...
Make your code faster by moving it outside the kernel Robert Graham Everyone knows moving code to the kernel makes it faster. This talk describes the opposite, ...