-
Welcome to Bsides
- BSides Organizers
-
FileLess Malware Infections
Malware Tricks For Pentesters
- Ramon Pinuaga
-
Controlling Your Neighbour's Lights: A Vulnerability
Assessment Study Over Common Energy Commercial Services
- André Garrido
-
Wild Wild Web App To
Domain Admin: A Case Study
- Nacho Sorribas
-
Welcome to Bsides
- BSides Organizers
-
How Storytelling Made Me
A Better Infosec Professional
- Javvad Malik
-
The Post-Quantum Project: Why and How?
- JP Aumasson
-
Abusing Android In-app Billing Feature
Thanks To A Misunderstood Integration
- Jérémy Matos
-
Intel AMT:
Using & Abusing The Ghost In The Machine
- Parth Shukla
-
Fantastic Signals And Where To Find Them
- Luís Grangeia and José Moreira
-
Knock Knock! Who's There? NSA!
- Pedro Vilaça
-
V!4GR4 BotNet: Cyber-Crime, Enlarged
- Ben Herzberg
-
GTFO Mr. User
- David Sopas
-
Crafting The Next-Generation
Man-In-The-Browser Trojan
- Pedro Fortuna and Paulo Silva
-
Practical Out-Of-Band
Data Exfiltration In 802.11
- João Pena Gil and Luis Gomes
-
Botnet Activity Monitoring
Through Process Puppeteering
- Tiago Pereira
-
I Boot When U-Boot
- Vincent Ruijter and Bernardo Maia Rodrigues
-
Hardware Basics
Why And How To Break Hardware.
- Kieran Roberts
-
I Thought I Saw a |-|4><0.-
- Thomas Fischer
-
Having Fun While Analyzing Mobile Applications
- Álvaro Felipe Melchor
-
Closing Ceremony
- BSides Organizers