-
BSides Intro
- BSides Munich Orga
-
Is There Anybody Out There?
- Thomas Schreck
-
MacOS Endpoint Security Framework:
What It Can Do And How To Use It
- Connor Morley
-
When Usability Met 2FA
- Hyunsu Kim,Junoh Lee,Kihong Heo,Sang Kil Cha and Myeong Geun Shin
-
Master Of Puppets:
How To Tamper The EDR?
- Daniel Feichter
-
Keeping Electric Vehicles Secure:
The Need For A CAN Security Framework
- Sivaranjani Sankaralingam
-
Attacks On Automotive Diagnostics
- Javier Vazquez and Ethan Briggs
-
Hacking And Exploit Development
For Bluetooth Low Energy (BLE)
- Sarah Mader
-
Fuzzing USB With Raw Gadget
- Andrey Konovalov
-
From A Simple Log To Sophisticated Crypter
- Hido Cohen and Arnold Osipov
-
Building An ICS Firing Range (In Our Kitchen):
Sharing Our Journey & Lessons Learned (So You Don’t Have To)
- Nico Leidecker and Moritz Thomas
-
Building A Security Program
For SaaS Product Development
- Christian Bauer
-
Not Quite Water Under The Bridge:
Review Of Cross-chain Bridge Hacks
- Sebastian Banescu
-
Attacking The Malware With AI: Where The Finest
Concepts Of Data Science & Cybersecurity Meet
- Dimitris Prasakis
-
MIME Is Broken
- Steffen Ullrich
-
How We Got Into A Unicorn’s Private Codebase
Through Analyzing Millions Of Mobile Apps
- Ashikka Gupta and Arshit Jain
-
Advanced Bot Landscape
- Yohann Sillam
-
Measuring Cyber Defense
With The MITRE Framework
- Marcus Osterloh
-
Adding DAST To CI/CD,
Without Any Losing Friends
- Tanya Janca
-
BSides Outro
- BSides Munich Orga