BSidesLondon 2014 April 29, 2014 to April 29, 2014, London,UK
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Insecure Out of the box | Robert Miller | "Insecure out of the box: Leveraging Android manufacturer's mistakes to attack corporate networks. We have ... | |
Breaking Binary Protocols and Bad Crypto | Graham Sutherland | "This talk is a running account of a few weeks spent attacking and reverse-engineering a ... | |
Poor Man's Static Analysis | Jon Butler | "When you're hunting for bugs, let's face it - grepping for strcpy just doesn't cut ... | |
LOL (Layers On Layers) - bypassing endpoint security for fun and profit | Rafal Wojtczuk | Over the past many years, there've been a plethora of security solutions available for Windows-based ... | |
Defensive Security Research is Sexy Too (& Real Sign of Skill) | Ollie Whitehouse | This brief (30 to 45 minutes) presentation will discuss why security research shouldn't always be ... | |
Finux's Historical Tour Of IDS Evasion, Insertions, and Other Oddities | Aaron f1nux Finnon | Roll up, Roll up, my Lords, Ladies and Gentleman, come see the bizarre and wondrous ... | |
Privacy: State of the (performance) Art. | Stephan Bonner | Privacy is a basic human right; our democracy has the secret ballot at its very ... | |
A Day In The Life (Of A Security Researcher) | Craig Young | Ever wonder how to find vulnerabilities? In 2013, I averaged 4-6 CVE assignments each month ... | |
Tor: Attacks and Countermeasures | Gareth Owen | Tor is an anonymisation network which allows users to browse the internet without their true ... | |
Honeywords: Detectable Password Theft | Gavin Holt | Password theft is an ever increasing problem. One of the challenges of password theft is ... | |
Top 10 Epic Fails in Identity | Paul Simmonds | How we do Identity (and authentication) is well screwed-up, with the big names in the ... | |
Continuous Security Testing in a Devops World | Stephen de Vries | Devops and Continuous Integration practices present unique challenges to security teams, such as when to ... |