BSidesMunich 2019 March 24, 2019 to March 25, 2019, Munich, Germany

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote - Better safe than sorry!.. Marcel Reifenberger Why we can’t win the InfoSec battle and what to do to survive will be ...
Fucking Containers - how do they work? Andreas Krebs How do containers actually work? Explaining the magic behind containers, which and how kernel features ...
For Crying out Cloud Stu Hirst Is your business moving into the Cloud? Is it thinking of moving into the Cloud? ...
Peekabooo - Advanced Bluetooth Device Detection Martin Herfurt Since most modern Bluetooth devices are configured to be invisible by default, discovery of these ...
The way from App to Brain: attack surfaces of smart medical infrastructure Denis Makrushin The concept of “SCADA for human” is central in focus of modern medicine. The realization ...
Security weaknesses in Machine Learning Daniel Etzold Machine learning has emerged to a very promising technology in the last few years. It ...
Exploiting Java RMI services in 2019 Hans-martin Münch Java RMI based services were one of the major victims of the “Java Deserialization Apocalypse” ...
My lessons learned in automotive Security Sebastian Haase I will present problems or obstacles that the automotive industry faces when building cars and ...
Cyber Risks 2019 - 2024: How management is seeing the challenge? Dennis Stade The management of cyberrisks is a challenge. For our current study, we asked CEO, managing ...
SmartAuth: Multi-Factor Authentication using Smart Card and Android on Web Muhammad Shahbaz To protect any resource in a system from an unauthorized entity, the authentication process is ...
Two New Ways to Exploit a Fixed Browser Fingerprinting Flaw Xiaoyin Liu Fingerprinting issues in web browsers are a complex matter. There are so many ways to ...
Quick and Easy Forensic Timelines via Sysmon, WEF, and ELK Aaron Jewitt Image your CISO comes into the SOC on a Saturday and asks a junior analyst ...
The Automation of Firmware-Analysis for IoT-Devices Alexander Poth The advances in information technology gave us the possibility of networking components, which today is ...