BSidesCanberra 2019 April 13, 2019 to April 14, 2019, Canberra, Australia

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote - "Quantum is Coming…" Elanor Huntington Three constellations of technologies are routinely cited these days as being the instruments through which ...
"Abuse of trust - Exploiting our relationship with public repositories" Path Developers and admin around the world use and trust public repositories, such as Python's PyPi, ...
"Coring Apple WiFi" Steve Glass iPhones have an enviable reputation for security. The close link between hardware and software, curated ...
"Deobfuscating JavaScript malware" Adrian Herrera JavaScript code can be hard enough to read and understand, even when it’s been well ...
"Kubernetes Security" Ben Cambourne Kubernetes is the leading container orchestration system, many organisations have deployed it, or are starting ...
"JWAT.... Attacking JSON Web Tokens" Louis Nowadays, JSON Web Tokens are everywhere. They are used as session tokens or just to ...
"Does Formal Verification Really Lead to Better Security?" Ihor Kuz The hype is that formally verification and mathematical proof give you hack-proof systems. But of ...
"Binary Patching - Making the Switch" Pete Rankin Despite its open source roots, the Android security ecosystem is still a black box for ...
"The fresh smell of ransom coffee" Martin Hron Let’s have a look at how breaking best security practices in smart devices can potentially ...
Keynote - "What's in a Jailbreak? Hacking the iPhone: 2014 -> 2019" Mark Dowd The iPhone is one of the most secure commercially available devices today. Apple has aggressively ...
"SSH, so hot right now. Profiling it with HASSH" Ben Karimi Is that SSH client/server really what it says it is ? Now you can tell ...
"IoT and the Future of Pentesting" Jeremy Goldstein The penetration testing industry and the skills required by pentesters has largely followed the macro ...
"Apathy and Arsenic: a Victorian Era lesson on fighting the surveillance state" Attacus What does expensive Victorian era wallpaper have in common with a Cambridge Analytica Facebook quiz? ...
"Wi-Bear: Intelligent Autonomous Wi-Fi Honeypot Detection" Vivek Ramachandran Wi-Fi networks are now the pervasive gateways to the Internet. Unfortunately, billions of Wi-Fi clients ...
"windows kernel fuzzing" Gimlu In recent years, Since the windows kernel security has been highly regarded .the Microsoft enhance ...
"Sample 78: Deconstruction Of A Linux Adversarial Toolkit" Christian Giuffre Malware analysis presentations are a dime a dozen, unless you want to chat about operating ...
"Source code security audit speed run" Eldar Marussen Source code security audit is the process of reviewing source code with the intent of ...