Security

Developer rooms | Room: UB4.132 | Day 1


Note: I'm reworking this at the moment, some things won't work.

  • Syd: An Introduction to Secure Application Sandboxing for Linux

    UB4.132 | 10:30 | 00:30 | Ali Polatel

  • Tightening every bolt

    UB4.132 | 11:00 | 00:30 | Daniel Stenberg

  • Kintsugi: A Decentralized E2EE Key Recovery Protocol

    UB4.132 | 11:30 | 00:30 | Emilie Ma

  • Nothing to see here - practical advice to avoid tunnel vision and similar decloaking techniques against VPNs

    UB4.132 | 12:00 | 00:30 | Till Maas

  • The SELinux problem that cast a months long shadow

    UB4.132 | 12:30 | 00:30 | Matyas Horky

  • A Practical Introduction to using sq, Sequoia PGP's CLI

    UB4.132 | 13:00 | 00:30 | Neal H. Walfield

  • Using DPoP to use access tokens securely in your Single Page Applications

    UB4.132 | 13:30 | 00:30 | Alexander Schwartz, Takashi Norimatsu

  • Breaking Barriers: The Art of (Free) Gamified Security Training

    UB4.132 | 14:00 | 00:30 | Joseph Katsioloudes

  • TKey, an open source/open hardware security token

    UB4.132 | 14:30 | 00:30 | Michael Cardell Widerkrantz

  • Hardware backed SSH keys: ssh-tpm-agent

    UB4.132 | 15:00 | 00:30 | Morten Linderud

  • Sigsum: Detecting rogue signatures through transparency

    UB4.132 | 15:30 | 00:30 | Niels Möller

  • An overview on detecting Login Anomalies with BuffaLogs

    UB4.132 | 16:00 | 00:30 | Federico Foschini, Lorena Goldoni

  • Managing Vulnerabilities in Open-Source Dependencies

    UB4.132 | 16:30 | 00:30 | Eva Sarafianou

  • What if Log4Shell were to happen today?

    UB4.132 | 17:00 | 00:30 | Piotr P. Karwasz

  • How Threat Actors Are Weaponizing Your Favorite Open-Source Package Registry

    UB4.132 | 17:30 | 00:30 | Ian Kretz, Sebastián Obregoso

  • Hunting for GitHub Actions bugs with zizmor

    UB4.132 | 18:00 | 00:30 | William Woodruff

  • Enhancing artifact security with GitHub Artifact Attestations

    UB4.132 | 18:30 | 00:30 | Fredrik Skogman