BSidesSF 2018 - Machine Learning: Too Smart for its Own Good (Thomas Phillips)
BSidesSF 2018 - Overcoming Obstacles in Operationalizing Security (Rafae Bhatti)
BSidesSF 2018 - How to Find if Your Developers are Leaking Secrets? (Ian Lee)
BSidesSF 2018 - Navigating the Vast Ocean of Browser Fingerprints (Russell Thomas)
BSidesSF 2018 - A Case Study of MacOS Supply Chain Compromise (Jason Craig • Michael George)
BSidesSF 2018 - Starting a Security Program: Thrills and Spills (Poornaprajna Udupi)
BSidesSF 2018 - Rise of Coinminers (Omri Segev Moyal)
BSidesSF 2018 - Data Driven Bug Bounty (Arkadiy Tetelman)
BSidesSF 2018 - Simple. Open. Mobile: A Look at the Future of Strong Authentication (Jerrod Chong)
BSidesSF 2018 - Tales of Red Teaming (Aladdin Mubaied • Rahul Nair)
BSidesSF 2018 - Fighting Secrets In Source Code With TruffleHog (Dylan Ayrey)
BSidesSF 2018 - Crimeware Chaos: Empirical Analysis of HTTP-Based Botnet C&C Panels (Aditya K Sood)
BSidesSF 2018 - Building a Predictive Pipeline to Rapidly Detect Phishing Domains (Wes Connell)
BSidesSF 2018 - What We Can Learn from Google’s Fight with Phishing (Neal Mueller)
BSidesSF 2018 - Introduction to Windows Kernel Mode Debugging (Yamin Tian)
BSidesSF 2018 - An Open Source Malware Classifier and Dataset (Phil Roth)
BSidesSF 2018 - Netrepser – A JavaScript Targeted Attack (Cristina Vatamanu)
BSidesSF 2018 - Practical Steps for Reducing Exposure and Detecting Compromise (Jim Nitterauer)
BSidesSF 2018 - Pensieve: Finding Malicious Artifacts in Container Environments (Yathi Naik)
BSidesSF 2018 - Keep it Like a Secret: When Android Apps Contain Private Keys (Will Dormann)