BsidesROC 2016 April 23, 2016 to April 23, 2016, rochester,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Android Application Function Hooking with Xposed Jaime Geiger The Xposed Framework can be used to hook and replace Java methods in Android applications. ...
Bitclamp: A Permanent and Anonymous Publishing Platform Over Bitcoin Joe Testa This presentation introduces Bitclamp, a new open-source project that uses the Bitcoin blockchain to permanently ...
Bringing a project back from hibernation – Reviving Kismet Mike Kershaw After several years in hibernation, Kismet is back under development with lots of new features ...
BSidesROC CTF: QA Session Jon Szymaniak QA session about CTF Challenges. Teams can get additional hints and/or explanations of challenges solved ...
Cluster Pi Gary Dewey A few months back, I started a project of making a mini-super computer with 4 ...
Counter UAS (C-UAS) Jeff Foley With the boom in private ownership of small, unmanned aircraft systems (UAS) – as many ...
CSRF Attack & Defense John N. King Cross-site request forgery vulnerabilities are often poorly understood and considered a low priority, making them ...
Deconstructing The Cyber Kill Chain of Angler Exploit Kit Artisom Holub In my research I try to deconstruct cyber kill chain involving one of the most ...
Economics of Information Security Fernando Montenegro Following a very short introduction to Economics, this session will be a discussion of how ...
Enterprise Class Threat Management like a Boss Rockie Brockway Attribution is hard. And in most business cases unnecessary. Threat Management, like Vulnerability Management, is ...
eSDP – Rings Around Things in the Cloud Duncan Sparrell This talk will describe an open source project to implement an additional security layer on ...
Exploring SecAccessControl Obj in iOS 9 Keychain Nitin Jami iOS’s keychain has gone through a lot of improvements since its inception. One notable feature ...
Fault Tolerant Command and Control Networks Nicholas Piazza The Command & Control (C2) network is the heart of any botnet. If you lose ...
How Secure is your Linux Distro? Matthew Arnold Talk will cover how security in a Linux distribution actually works. Topics will include Repository ...
How to Hug a Hacker Holly Turner Over the years, manufacturers have been schooled many times by hackers and ethical researchers. Manufacturers ...
I Know Where You Live: Privacy Issues in Location-Based Apps Gabe Kirkpatrick This talk will discuss the privacy issues that arise in location-based apps, show real world ...
Letting the Crap Out of the Bag: Adventures Disclosing IoT Bugs Max Sobell Carve has been hacking IoT device since… well, before they were called “IoT”! Believe us: ...
Let’s Check Let’s Encrypt: A Tool for Code-Driven Threat Modeling Christopher Wood Threatspec is a tool for code-driven threat modeling. It allows threat models to be codified ...
Let’s Go To The Movies! Dennis M. Allen This fun presentation will highlight interesting cyber security and hacker-like observations from a dozen movies ...
The Life and Times of Hans Ostmaster Chaim Sanders In this talk we investigate certain security ramifications of the security architecture of registering SSL ...
A (not so quick) Primer on iOS Encryption David Schuetz I try to explain, in simple terms and with useful diagrams, just how the complex ...
Passive detection doesn’t work: lessons from a hunter of elusive nation-states Devon Kerr The objective of this presentation is to outline why reactive detection frameworks are inherently flawed ...
Real security incidents, unusual situations Adam Dean Incident Response is a dynamic process where the unsuspected often becomes the root cause. From ...