BSidesLondon 2014 April 29, 2014 to April 29, 2014, London,UK

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Insecure Out of the box Robert Miller "Insecure out of the box: Leveraging Android manufacturer's mistakes to attack corporate networks. We have ...
Breaking Binary Protocols and Bad Crypto Graham Sutherland "This talk is a running account of a few weeks spent attacking and reverse-engineering a ...
Poor Man's Static Analysis Jon Butler "When you're hunting for bugs, let's face it - grepping for strcpy just doesn't cut ...
LOL (Layers On Layers) - bypassing endpoint security for fun and profit Rafal Wojtczuk Over the past many years, there've been a plethora of security solutions available for Windows-based ...
Defensive Security Research is Sexy Too (& Real Sign of Skill) Ollie Whitehouse This brief (30 to 45 minutes) presentation will discuss why security research shouldn't always be ...
Finux's Historical Tour Of IDS Evasion, Insertions, and Other Oddities Aaron f1nux Finnon Roll up, Roll up, my Lords, Ladies and Gentleman, come see the bizarre and wondrous ...
Privacy: State of the (performance) Art. Stephan Bonner Privacy is a basic human right; our democracy has the secret ballot at its very ...
A Day In The Life (Of A Security Researcher) Craig Young Ever wonder how to find vulnerabilities? In 2013, I averaged 4-6 CVE assignments each month ...
Tor: Attacks and Countermeasures Gareth Owen Tor is an anonymisation network which allows users to browse the internet without their true ...
Honeywords: Detectable Password Theft Gavin Holt Password theft is an ever increasing problem. One of the challenges of password theft is ...
Top 10 Epic Fails in Identity Paul Simmonds How we do Identity (and authentication) is well screwed-up, with the big names in the ...
Continuous Security Testing in a Devops World Stephen de Vries Devops and Continuous Integration practices present unique challenges to security teams, such as when to ...