-
Introduction
- Abertay Ethical Hacking Society
-
Software Security: Never Stop Evolving
- Nick Murison
-
We Take Your Security Seriously. Or Do We?
- The Beer Farmers
-
Beyond Windows Forensics
With Built-In Microsoft Tooling
- Thomas V Fischer
-
Obfuscating PDF Malware:
How I Nearly Created A FUD
- Jonathan Ross
-
GPU Accelerated Security
- Andrew Calder
-
7 Hardware Hacks For 7GBP
- Joe FitzPatrick
-
RATs, Crypters & Zombies:
A History Of Consumer Malware
- Dan Nash
-
Profiling The Attacker:
Why Data Is Good, But Context Is Better
- James Stevenson
-
Using Natural Language Processing
Techniques To Crack Passwords
- Robin Vickery
-
Ridiculous Radios
- Dominic Spill
-
Physical Security Games: Lessons Learnt
Building CTF Challenges For Hackers
- Steve Wilson
-
Striking While The Iron's Hot
The Do's And Dont's For Getting A Job In Infosec
- J Stevenson,C Ungar,B Calderbank and D Nash & J Wilson
-
Hardware Isn't Hard
- Graham Sutherland
-
Mobile Application Hardening:
Protecting Business Critical Apps
- Grant Douglas And Nikola Cucakovic
-
From Breaking In To Breaking Through: The Applicability Of
Skills From Social Engineering To Teaching Security Behaviours
- Rose Regina Lawrence
-
Intro To Machine Learning For Hackers
- Helena Lucas
-
Where 2 Worlds Collide:
Bringing Mimikatz Et Al To UNIX
- Tim Wadhwa-Brown
-
Weaponising Layer-8
- Stefan Hager
-
It Might Get Loud!
Exfiltrating Data Using Audio Interfaces
- Miguel Marques
-
Back To School: Bringing It Back To The Students
- Callan Garratley
-
ISIS Online: Junaid Hussain
- Michael Jack
-
Closing Remarks
- Abertay Ethical Hacking Society