S2014E01 |
Opening Keynote -- Beyond Good and Evil: Towards Effective Security
|
August 5, 2014
|
|
|
S2014E02 |
SHA-1 backdooring and exploitation
|
August 5, 2014
|
|
|
S2014E03 |
#edsec: Hacking for Education
|
August 5, 2014
|
|
|
S2014E04 |
The Power Law of Information
|
August 5, 2014
|
|
|
S2014E05 |
USB write blocking with USBProxy
|
August 5, 2014
|
|
|
S2014E06 |
Skull And Bones (And Warez) - Secret Societies of the Computer Underground (and why you should create one too)
|
August 5, 2014
|
|
|
S2014E07 |
So, you want to be a pentester?
|
August 5, 2014
|
|
|
S2014E08 |
Evading code emulation: Writing ridiculously obvious malware that bypasses AV
|
August 5, 2014
|
|
|
S2014E09 |
Measuring the IQ of your Threat Intelligence feeds
|
August 5, 2014
|
|
|
S2014E10 |
Secure your email – Secure your password
|
August 5, 2014
|
|
|
S2014E11 |
Allow myself to encrypt...myself!
|
August 5, 2014
|
|
|
S2014E12 |
Custodiet watches your packets! The Open Source MSSP Framework
|
August 5, 2014
|
|
|
S2014E13 |
Securing Sensitive Data: A Strange Game
|
August 5, 2014
|
|
|
S2014E14 |
Is Pavlovian Password Management The Answer?
|
August 5, 2014
|
|
|
S2014E15 |
Highlights of CMU’s Recent Work in Preventing Bad Passwords
|
August 5, 2014
|
|
|
S2014E16 |
DoCatsLikeLemon? – Advanced phrase attacks and analysis
|
August 5, 2014
|
|
|
S2014E17 |
Password Hashing Competition: the Candidates
|
August 5, 2014
|
|
|
S2014E18 |
Brick in the Wall vs Hole in the Wall
|
August 5, 2014
|
|
|
S2014E19 |
What reaction to packet loss reveals about a VPN
|
August 5, 2014
|
|
|
S2014E20 |
Security Management Without the Suck
|
August 5, 2014
|
|
|
S2014E21 |
Master Serial Killer
|
August 5, 2014
|
|
|
S2014E22 |
Strategies Without Frontiers
|
August 5, 2014
|
|
|
S2014E23 |
Tradeoff cryptanalysis of password hashing schemes
|
August 5, 2014
|
|
|
S2014E24 |
What Microsoft would like from the Password Hashing Competition
|
August 5, 2014
|
|
|
S2014E25 |
Cut the sh**: How to reign in your IDS
|
August 5, 2014
|
|
|
S2014E26 |
Using cryptanalysis to speed-up password cracking
|
August 5, 2014
|
|
|
S2014E27 |
Untwisting the Mersenne Twister: How I killed the PRNG
|
August 5, 2014
|
|
|
S2014E28 |
Vulnerability Assessments on SCADA: How i 'owned' the Power Grid
|
August 5, 2014
|
|
|
S2014E29 |
501(c)(3) for (un)fun and (non)profit
|
August 5, 2014
|
|
|
S2014E30 |
Geek Welfare -- Confessions of a Convention Swag Hoarder
|
August 5, 2014
|
|
|
S2014E31 |
ClusterF*ck - Actionable Intelligence from Machine Learning
|
August 5, 2014
|
|
|
S2014E32 |
Password Security in the PCI DSS
|
August 5, 2014
|
|
|
S2014E33 |
How Forced Password Expiration Affects Password Choice
|
August 5, 2014
|
|
|
S2014E34 |
No InfoSec Staff? No Problem
|
August 5, 2014
|
|
|
S2014E35 |
Anatomy of memory scraping, credit card stealing POS malware
|
August 5, 2014
|
|
|
S2014E36 |
Malware Analysis 101 - N00b to Ninja in 60 Minutes
|
August 5, 2014
|
|
|
S2014E37 |
Protecting Data – How Cultural-Political Heritage Shapes Security Approaches
|
August 5, 2014
|
|
|
S2014E38 |
Can I Code Against an API to Learn a Product?
|
August 5, 2014
|
|
|
S2014E39 |
Know thy operator
|
August 5, 2014
|
|
|
S2014E40 |
Defense with 2FA
|
August 5, 2014
|
|
|
S2014E41 |
Security for the People: End-User Authentication Security on the Internet
|
August 5, 2014
|
|
|
S2014E42 |
Bridging the Air Gap: Cross Domain Solutions
|
August 5, 2014
|
|
|
S2014E43 |
Cluck Cluck: On Intel's Broken Promises
|
August 5, 2014
|
|
|
S2014E44 |
Travel Hacking With The Telecom Informer
|
August 5, 2014
|
|
|
S2014E45 |
FAP Fully Automated Pwning Techniques for Automated Reversing
|
August 5, 2014
|
|
|
S2014E46 |
Improving security by avoiding traffic and still get what you want in data transfers
|
August 5, 2014
|
|
|
S2014E47 |
Back Dooring the Digital Home
|
August 5, 2014
|
|
|
S2014E48 |
I have the hashcat so I make the rules
|
August 5, 2014
|
|
|
S2014E49 |
Authentication in the Cloud – Building Service
|
August 5, 2014
|
|
|
S2014E50 |
The Semantic Age - or - A Young Ontologist's Primer
|
August 5, 2014
|
|
|
S2014E51 |
Penetrate your OWA
|
August 5, 2014
|
|
|
S2014E52 |
How EFF is Making STARTTLS Resistant to Active Attacks
|
August 5, 2014
|
|
|
S2014E53 |
Offline bruteforce attack on Wifi Protected Setup
|
August 5, 2014
|
|
|
S2014E54 |
All your SAP P@$$w0ЯdZ belong to us
|
August 6, 2014
|
|
|
S2014E55 |
Proof of work as an additional factor of authentication
|
August 6, 2014
|
|
|
S2014E56 |
iOS URL Schemes: omg://
|
August 6, 2014
|
|
|
S2014E57 |
A Better Way to Get Intelligent About Threats
|
August 6, 2014
|
|
|
S2014E58 |
The untold story about ATM Malware
|
August 6, 2014
|
|
|
S2014E59 |
A&Q Session - Communications Presentation
|
August 6, 2014
|
|
|
S2014E60 |
A&Q Session - Disclosure
|
August 6, 2014
|
|
|
S2014E61 |
A&Q Session - Burnout
|
August 6, 2014
|
|
|
S2014E62 |
A&Q Session - Legal
|
August 6, 2014
|
|
|
S2014E63 |
A&Q Session Media
|
August 6, 2014
|
|
|
S2014E64 |
A&Q Session - X Altruism
|
August 6, 2014
|
|
|
S2014E65 |
A&Q Session - Career
|
August 6, 2014
|
|
|
S2014E66 |
Business lessons that made me a better Security Professional
|
August 6, 2014
|
|
|
S2014E67 |
Target specific automated dictionary generation
|
August 6, 2014
|
|
|
S2014E68 |
The future of mobile authentication is here
|
August 6, 2014
|
|
|
S2014E69 |
Oops, That Wasn't Suppossed To Happen: Bypassing Internet Explorer's Cross Site Scripting Filter
|
August 6, 2014
|
|
|
S2014E70 |
Bring your own Risky Apps
|
August 6, 2014
|
|
|
S2014E71 |
Using Superpowers for Hardware Reverse Engineering
|
August 6, 2014
|
|
|
S2014E72 |
Reverse Engineering Mac Malware
|
August 6, 2014
|
|
|
S2014E73 |
What I've Learned As A Con-Man
|
August 6, 2014
|
|
|
S2014E74 |
Bitslice DES with LOP3.LUT
|
August 6, 2014
|
|
|
S2014E75 |
Password hashing delegation: How to get clients work for you
|
August 6, 2014
|
|
|
S2014E76 |
Training with Raspberry Pi
|
August 6, 2014
|
|
|
S2014E77 |
Invasive Roots of Anti-Cheat Software
|
August 6, 2014
|
|
|
S2014E78 |
Why am I surrounded by friggin' idiots?!? (Because you hired them!)
|
August 6, 2014
|
|
|
S2014E79 |
Secret Pentesting Techniques Part Duex
|
August 6, 2014
|
|
|
S2014E80 |
Net hashes: A review of many network protocols
|
August 6, 2014
|
|
|
S2014E81 |
Throw the User ID Down the Well
|
August 6, 2014
|
|
|
S2014E82 |
Black Magic and Secrets: How Certificates Influence You!
|
August 6, 2014
|
|
|
S2014E83 |
Attacking Drupal
|
August 6, 2014
|
|
|
S2014E84 |
Vaccinating Android
|
August 6, 2014
|
|
|
S2014E85 |
Demystiphying and Fingerprinting the 802.15.4/ZigBee PHY
|
August 6, 2014
|
|
|
S2014E86 |
Energy-efficient bcrypt cracking
|
August 6, 2014
|
|
|
S2014E87 |
Password Generators & Extended Character Set Passwords
|
August 6, 2014
|
|
|
S2014E88 |
Ripped from the Headlines What the news tells us about Information Security Incidents
|
August 6, 2014
|
|
|
S2014E89 |
RFID Hacking
|
August 6, 2014
|
|
|
S2014E90 |
Hackers vs Auditors
|
August 6, 2014
|
|
|
S2014E91 |
Insider Threat Kill Chain: Human Indicators of Compromise
|
August 6, 2014
|
|
|
S2014E92 |
Security testing for Smart Metering Infrastructure
|
August 6, 2014
|
|
|
S2014E93 |
Fuck These Guys: Practical Countersurveillance
|
August 6, 2014
|
|
|
S2014E94 |
The problem with the real world
|
August 6, 2014
|
|
|
S2014E95 |
Encryption and Authentication: Passwords for all reasons
|
August 6, 2014
|
|
|
S2014E96 |
Third-Party Service Provider Diligence: Why are we doing it all wrong?
|
August 6, 2014
|
|
|
S2014E97 |
A Place to Hang Our Hats: Security Community and Culture
|
August 6, 2014
|
|
|
S2014E98 |
Pwning the hapless or How to Make Your Security Program Not Suck
|
August 6, 2014
|
|
|
S2014E99 |
Password Topology Histogram Wear-Leveling, a.k.a. PathWell
|
August 6, 2014
|
|
|
S2014E100 |
Enhancing Password Based Key Derivation Techniques
|
August 6, 2014
|
|
|
S2014E101 |
The Savage Curtain
|
August 6, 2014
|
|
|
S2014E102 |
Booze, Devil's Advocate, and Hugs: the Best Debates Panel You'll See at BSidesLV 2014
|
August 6, 2014
|
|
|
S2014E103 |
Ask the EFF
|
August 6, 2014
|
|
|
S2014E104 |
Teach a man to Phish...
|
August 6, 2014
|
|
|
S2014E105 |
The Lore shows the Way
|
August 6, 2014
|
|
|
S2014E106 |
Beam Me Up Scotty! – Passwords in the Enterprise
|
August 6, 2014
|
|
|
S2014E107 |
Capturing Passwords into the Secure Desktop
|
August 6, 2014
|
|
|
S2014E108 |
We Hacked the Gibson! Now what?
|
August 6, 2014
|
|
|
S2014E109 |
The Only Way to Tell the Truth is in Fiction: The Dynamics of Life in the National Security State
|
August 6, 2014
|
|
|
S2014E110 |
Closing Keynote
season finale
|
August 6, 2014
|
|
|