Justin Ehrenhofer — Improving Monero Release Schedule — DEF CON 27 Monero Village
Monero has a biannual major release schedule, but it has been hit with setback after setback despite the best efforts…Подробнее
Monero has a biannual major release schedule, but it has been hit with setback after setback despite the best efforts…Подробнее
Kristy-Leigh will discuss the importance of accessible mining in consumer applications and the work that she has done at Core…Подробнее
Presentations from the DEF CON 27 ICS Village
Here we explore Mimblewimble, a blockchain construction for private transactions. How does it function and how do the three implementations…Подробнее
Presentations from the DEF CON 27 ICS Village
Jeremy will be speaking about the EFF’s past and ongoing efforts to encrypt the web.
Presentations from the DEF CON 27 ICS Village
A Texas bill has been introduced that encourages the use of what is termed a “verified identity digital currency,” which…Подробнее
This talk presents the methodology, findings and conclusions of a boundary theory based Information Systems research project completed at University…Подробнее
Presentations from the DEF CON 27 ICS Village
Cars now have infotainment systems for several years. Those systems accomplish basic tasks such as radio, music, navigation and Bluetooth…Подробнее
In 2017, Vik launched Cake Wallet which is a popular open-source Monero wallet that allows users to hold Monero, make…Подробнее
Due to internal environment of Windows domains is always too tolerant, and enterprises are more concerned about border defenses than…Подробнее
Industrial Control System(ICS) protocols are often neglected in the realm of network security monitoring. Detecting, parsing, and finding malicious activity…Подробнее
When the shadow brokers released a large number of Equation Group tools in 2017, many researchers jumped on the analysis…Подробнее
The InfoSec industry was born out of fear. Initially it was fear from virus infections and later, external attacks. We…Подробнее
In today’s ecosystem, verification of identity is no longer applicable just to the user; extending to microservices, cloud providers, IoT…Подробнее
In this talk we will go over traditional log analysis methods for AWS Cloudtrail logs and why we needed to…Подробнее
BloodHound was originally built for Pentesters to easily identify highly complex attack paths but it can also be used to…Подробнее
Panel discussion with blue teamers leading in the SMB industry.
A mostly live demo of base concepts of malware analysis using a multitude of tools on a Dridex sample pulled…Подробнее
Memhunter is an endpoint sensor tool specialized in detecting memory-resident malware. The detection process is performed through a combination of…Подробнее
Following testimony in Congress and a lengthy investigation of the Equifax breach in 2016, U.S. House of Representatives drafted a…Подробнее
The security industry is facing a severe talent shortage, but the threats are growing in number and sophistication. Finding talent,…Подробнее
What if I told you that it is possible for blue teamers to practice CTI everyday?! With minimal guidance and…Подробнее
The life of a blue-teamer is daunting. There are logs to sift through, tasks to automate, incidents to triage, vulnerabilities…Подробнее
Network Behavior Anomaly Detection (NBAD) and User and Entity Behavior Analytics (UEBA) are heralded as machine learning fueled messiahs for…Подробнее
The data center embodies the heart of many businesses on the Internet. It contains much of the information in a…Подробнее
Red Team Framework RTF
Red Team operations require substantial efforts to both create implants and a resilient C2 infrastructure. SiestaTime aims to merge these…Подробнее