boot
Red Ops: Scaling & Automating Your Pwnage
Economics of Information Security
Cluster Pi
Let’s Check Let’s Encrypt: A Tool for Code-Driven Threat Modeling
Bitclamp: A Permanent and Anonymous Publishing Platform Over Bitcoin
A (not so quick) Primer on iOS Encryption
How to Hug a Hacker
Bringing a project back from hibernation – Reviving Kismet
Keynote
How Secure is your Linux Distro?
Exploring SecAccessControl Obj in iOS 9 Keychain
BSidesROC CTF: QA Session
The Life and Times of Hans Ostmaster
Enterprise Class Threat Management like a Boss
Android Application Function Hooking with Xposed
Real security incidents, unusual situations
Letting the Crap Out of the Bag: Adventures Disclosing IoT Bugs
Passive detection doesn’t work: lessons from a hunter of elusive nation-states
Fault Tolerant Command and Control Networks
CSRF Attack & Defense
I Know Where You Live: Privacy Issues in Location-Based Apps
Let’s Go To The Movies!
Deconstructing The Cyber Kill Chain of Angler Exploit Kit
Counter UAS (C-UAS)
eSDP – Rings Around Things in the Cloud
Closing Ceremony