Your Search

Reset Search

Filter by

 

2018 Conference Programme

Search

  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all

Results

1 - 12 of 14 results

|

Items per page:

Sort By
  • An Introduction to Exploitation

    Tuesday10:30 - 11:1505 Jun 2018
    Geek Street

    Exploits have been the core of how cyber criminals and nation state actors distribute malicious code for many years, from popping shells remotely to exploiting ...

    • Language: English

  • Unleashing the Automated Memory Forensics Playbook to Hunt for Evasive Malware

    Tuesday11:45 - 12:3005 Jun 2018
    Geek Street

    Fileless attacks and evasive malware are realities that blue teams must deal with on an ongoing basis. Memory forensics are useful in this fight, but it can be ...

    • Language: English

  • The Apple of your EFI: An Updated Analysis of the State of Apple’s EFI Security Support

    Tuesday13:00 - 13:4505 Jun 2018
    Geek Street

    Duo Labs performed analysis over more than 73,000 realworld Apple Mac systems to see how the state of their running EFI compared to the expected state of their ...

    • Language: English

  • Security is an Illusion: How I Rob Banks

    Tuesday14:15 - 15:0005 Jun 2018
    Geek Street

    A light-hearted trip through security failures both physical and electronic that have enabled me over the years to circumvent security of most of the world's la...

    • Language: English

  • Blockchain-Based C&C Techniques: Towards a Persistent Channel

    Tuesday15:30 - 16:1505 Jun 2018
    Geek Street

    Existing technologies like IRC, HTTP servers or even social media accounts have been traditionally used as C&C channels in the search of mechanisms that provide...

    • Language: English

  • Time of Death? A Therapeutic Post-Mortem for Medical Infrastructure

    Wednesday10:30 - 11:1506 Jun 2018
    Geek Street

    Patient-doctor confidentiality is a sacred bond. A time to share anxieties and concerns with an entrusted caretaker and no one else. So how do we account for th...

    • Language: English

  • Hacking the World’s Most Secure Communications Protocol

    Wednesday11:45 - 12:3006 Jun 2018
    Geek Street

    We’re living in the age of cybersecurity where every month we see an announcement for the newest and coolest ‘next generation’ thing. Whilst we are making some ...

    • Language: English

  • Hardware Hacking: What Can Adult Toys Tell Us About the State of the IoT?

    Wednesday13:00 - 13:4506 Jun 2018
    Geek Street

    Hacking adult toys is headline grabbing stuff, but their flawed hardware security shares much with the rest of the IoT. In this hardware hacking session you’ll ...

    • Language: English

  • Software Protection in the ASPIRE Project

    Wednesday14:15 - 15:0006 Jun 2018
    Geek Street

    Software Protection techniques aim to defend the confidentiality and integrity of software applications running on untrusted hosts (PC, smartphone, cloud) which...

    • Language: English

  • Hunting PBX for Vulnerabilities

    Wednesday15:30 - 16:1506 Jun 2018
    Geek Street

    Our main motto for this session is to walk through the multiple vulnerabilities present in PBX that may possess threat to any individual or organisation. This t...

    • Language: English

  • Stackoverflow: The Vulnerability Marketplace

    Thursday10:30 - 11:1507 Jun 2018
    Geek Street

    Whether we like to admit it or not, we've all borrowed code from stackoverflow at one time in our lives. Many do it more often than they care to admit. If a vul...

    • Language: English

  • Black Info Ops Approach to Evaluate Critical Infrastructure Security

    Thursday11:45 - 12:3007 Jun 2018
    Geek Street

    This talk explains how the combination of Information Ops, Intelligence and Hacking can provide a far broader view to identify and exploit weaknesses in critica...

    • Language: English

Media Partners

Health Service Journal CyberExchange SC Media CIO Applications Crest HTN Awards 2018 Computing Security Network Computing Ciso Ciso Ciso

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.