BSidesCanberra 2018 April 13, 2018 to April 13, 2018, Canberra, Australia
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Special Redacted | N/a | N/A | |
"Spectre and Meltdown: Speculative Execution Considered Harmful" | Yuval Yarom | Spectre and Meltdown are two recently disclosed attacks that exploit a vulnerability in speculative execution, ... | |
AWS Serverless Exploitation Public Attack Vectors | Matt Flannery | Functions-as-a-Service (FaaS) is an emerging application architecture quickly replacing traditional monolothic application architecture. Applications are ... | |
BSides Entertainment System - Wearable gaming but your princess is in another castle | Peter | Just before Christmas 1995, mum purchased a Nintendo Entertainment System and asked “how long should ... | |
Introduction to Cisco IOS analysis | Adrian Justice | 2015 saw the discovery of SYNful Knock, the first known instance of malware for Cisco ... | |
Tech Keynote: "Making the most of your Hard(ware) work" | Joe Fitzpatrick | It's true. Hardware is hard, and the cards are stacked against it. Longer dev cycles, ... | |
"The Count's A-to-Z of Windows Privilege Esclation" | Lukasz Gogolkiewicz | This talk is a humorous view into the art of escalating ones privileges within a ... | |
Contactless Access Control 2: Life, uh, finds a way | Ryan & Jeremy | Have you ever spent days waiting to clone the right card to get (back) into ... | |
"Get-GPTrashFire: Identifying and Abusing Vulnerable Configurations in MS AD Group Policy" | Mike Loss | AD Group Policy is a very big gun, and admins shoot themselves in the foot ... | |
"How much can commodity hardware help on closing microarchitecture timing channels?" | Qian Ge | We investigate how different categories of microarchitectural state on recent ARM and x86 processors can ... | |
"Zero clients in the enterprise - Skating on THIN ice" | Eldar Marcussen | The use of thin, ultra thin and zero clients are on a rapid rise across ... | |
"It's a UNIX System - Intel ME, JTAG and FOSS BIOSes" | James "ec0" Hebden | In this talk I will explain the current threats to security and freedom presented by ... | |
"A Wolf Among the Crowd" | Nilesh Kapoor | Unbeknown to them, a lone hacker has gained physical access to their secure office. Sitting ... | |
"Demystifying SharePoint Security" | Michael Skelton | A SharePoint security talk taking the perspective of an attacker, penetration tester or internal administrator ... | |
"Microarchitectural attacks: reflecting on 45 years of research since 'A note on the confinement problem'" | Paul Harvey | 2018 started with Meltdown and Spectre, some of the most difficult and expensive industry-wide vulnerabilities ... | |
"Hacking Deterministic Bitcoin Addresses" | Michael Mckinnon | Bitcoin addresses are generated using Elliptic Curve cryptography, specifically secp256k1, which until Bitcoin started, wasn't ... | |
Tech keynote: "Cyberwar before there was Cyber: Hacking WWII Electronic Bomb Fuses" | Peter Gutmann | While the Allies went to war with mechanical and chemical bomb fuses whose origins dated ... | |
"Operation Luigi: How I hacked my friend without her noticing" | "alex" | Yep so I asked my friend if I could hack her and she said yes. ... | |
"unrubby: reversing bytecode for the lazy" | Richö Butts | Obfuscating code is typically the domain of native code, or at least statically dispatched bytecode ... | |
"Freedom of Information - Hacking the Human Black Box" | Elliott Brink | FOIA (otherwise known as the Freedom of Information Act or FOI/Freedom of Information in Australia) ... | |
"Low-Tech Answers to High Security Locks - Keying the Lockwood V7" | Oliver Clayton | The Lockwood V7 is a well known high-security lock. The interesting pin setup coupled with ... | |
"That's Not How This Works" | Sharrow | N/A | |
"Secure Corroding with Rust" | Cameron Ford | We all want to make our programs more secure and thankfully we have things to ... | |
"Gaming Anticheat" | Marisa | As long as there have been multiplayer games online, there have been cheaters. Where there ... | |
"Contain Yourself!" | Zemmi | Contain Yourself! is a talk some of the hard lessons I’ve learned running Docker and ... | |
"seL4 & Family: Fast, Trustworthy, Cheap, Deployed" | Ihor Kuz | Since the breakthrough of the world’s first formally verified OS kernel in 2009, seL4 has ... | |
BSides Canberra Panel | N/a | N/A |