BSidesVienna 2015 Nov. 21, 2015 to Nov. 21, 2015, Vienna,Austria
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Cryptography tools, identity vectors for djihadists | Julie Gommes | Cryptography, social networks, today the use of online tools and serving to protect their communications ... | |
Digital Supply Chain: The Exposed Flank | David C. Lewis | This talk will speak to the issues pertaining to supply chain security as is relates ... | |
Pole Vaulting over Agile Security Pits | Daniel Liber | Talking about Agile security has been going on for 10 years or so now, including ... | |
Privilege Escalation via Client Management Software | Matthias Deeg | Software products requiring high privileges, usually administrative rights, in order to perform their functions are ... | |
A case study on the security of application whitelisting | René Freingruber | Application whitelisting is a concept which can be used to further harden critical systems such ... | |
ZigBee Smart Homes - A Hacker's Open House | Tobias Zillner | ZigBee is one of the most widespread communication standards used in the Internet of Things ... | |
Forensics at Scale | Martin Schmiedecker | Recently a number of open-source tools have been published that allow the timely acquisition and ... | |
The AWS Survival Guide | Philipp Krenn | AWS provides a vast amount of services — some are made explicitly for security purposes ... | |
Incident Handling Automation with intelmq | Aaron Kaplan , Sebastian Wagner , Otmar Lendl | Spam sending devices, botnet drones, scanners, c&c servers, compromised servers, DDoS infrastructures, phishing websites - ... | |
Mess with the web | Alexander Inführ | In the talk I will talk about the problems of PDFs in the context of ... | |
OSSEC-HIDS | Theresa | Logfile Analysis is the staff of life of every sysadmin or developer. You have to ... | |
Writing your first windows exploit in less than one hour - Workshop | Klaus Gebeshuber | Starting with some basics about stack layout, function calling, buffer overflows, overwriting return addresses and ... | |
Steganography in File-system Metadata | Sebastian Neuner | I present you a new technique to hide data in file system metadata, in particular ... | |
Practical Invalid Curve Attacks on TLS-ECDH | Ing Juraj Somorovsky | Elliptic Curve Cryptography (ECC) is based on cyclic groups, where group elements are represented as ... | |
The Fuzzing Project – one year later | Hanno Böck | Last year I started the Fuzzing Project as a coordinated effort to fuzz free software ... | |
La Quadrature Du Cercle – The APTs That Weren’t | Marion Marschalek | For more than two decades classical threat detection has painted the world black and white. ... | |
The Psychology of Security | Stefan Schumacher | IT Security is often considered to be a technical problem. However, IT Security is about ... | |
Combinatorial Security Testing | Dimitris e. Simos , Bernhard Garn | In this talk, we give an overview of "Combinatorial Security Testing (CST)", a recently established ... | |
KCI-based Man-in-the-Middle Attacks against TLS | Clemens Hlauschek | Transport Layer Security (TLS) is the most important standard to secure communication cryptographically on the ... |