BSidesCanberra 2019 March 15, 2019 to March 16, 2019, Canberra, Australia

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote: Quantum is coming… Professor Elanor Huntington Three constellations of technologies are routinely cited these days as being the instruments through which ...
Keynote: What's in a Jailbreak? Hacking the iPhone: 2014 -> 2019 Mark Dowd The iPhone is one of the most secure commercially available devices today. Apple has aggressively ...
Coring Apple WiFi Steve Glass iPhones have an enviable reputation for security. The close link between hardware and software, curated ...
Kubernetes Security Ben Cambourne Kubernetes is the leading container orchestration system, many organisations have deployed it, or are starting ...
Abuse of trust - Exploiting our relationship with public repositories Path Developers and admin around the world use and trust public repositories, such as Python's PyPi, ...
JWAT.... Attacking JSON Web Tokens Louis Nowadays, JSON Web Tokens are everywhere. They are used as session tokens or just to ...
Deobfuscating JavaScript malware Adrian Herrera JavaScript code can be hard enough to read and understand, even when it’s been well ...
Does Formal Verification Really Lead to Better Security? Ihor Kuz The hype is that formally verification and mathematical proof give you hack-proof systems. But of ...
The fresh smell of ransom coffee Martin Hron Let’s have a look at how breaking best security practices in smart devices can potentially ...
Binary Patching - Making the Switch Peter Despite its open source roots, the Android security ecosystem is still a black box for ...
Sample 78: Deconstruction Of A Linux Adversarial Toolkit Christian Giuffre Malware analysis presentations are a dime a dozen, unless you want to chat about operating ...
SSH, so hot right now. Profiling it with HASSH Ben Karimi Is that SSH client/server really what it says it is ? Now you can tell ...
windows kernel fuzzing Gmliu In recent years, Since the windows kernel security has been highly regarded .the Microsoft enhance ...
IoT and the Future of Pentesting Jeremy Goldstein The penetration testing industry and the skills required by pentesters has largely followed the macro ...
Wi-Bear: Intelligent Autonomous Wi-Fi Honeypot Detection Vivek Ramachandran Wi-Fi networks are now the pervasive gateways to the Internet. Unfortunately, billions of Wi-Fi clients ...
Source code security audit speed run Eldar Marcussen Source code security audit is the process of reviewing source code with the intent of ...
Apathy and Arsenic: a Victorian Era lesson on fighting the surveillance state Attacus What does expensive Victorian era wallpaper have in common with a Cambridge Analytica Facebook quiz? ...