Home
Talks
CFP Guide
What is BSides?
About
Contact
Light
← All talks
Category
Research talks at BSides
405 talks tagged
Research
from 84 chapters of BSides events worldwide.
Related topics
Empirical Research
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Vulnerability Research
Advanced
35:36
(Perfect) Cell Games: You Thought It Was Just Surveillance...
Mike Curnow
Bsides CT 2025
Research
Technical
Cellular Security
Wireless Security
Advanced
Red
Technical Deep-dives
Talk
Open →
2025-12
33:48
How to Start a Cyber War: Lessons from Brussels – EU Cyber Warfare Exercises
Chris Kubecka
BSides Las Vegas
· 2018
Policy
Research
Talk
Open →
2018-09
36:13
WiFi-based IMSI Catcher - Piers O'Hanlon
Piers O'Hanlon
BSides London
· 2017
Research
Technical
Cellular Security
Wireless Security
Advanced
Talk
Open →
2017-06
44:22
Diamond Model for Intrusion Analysis: What You Need to Know
Andy Pendergast
BSides DC
· 2014
Research
Blue
Methodology
Talk
Open →
2014-10
13:22
Watching The Watchers: The Stalkerware Surveillance Ecosystem
Cian Heasley
BSides London
· 2019
Research
Technical
Malware Analysis
Privacy
Reverse Engineering
Talk
Open →
2019-06
29:19
Hunting the Bug Hunters
BSides Ahmedabad
Research
Talk
Open →
2024-05
33:03
16Shop: A Deep Dive into the Swiss Army Knife of Phishing Kits
Amiram Cohen
BSides TLV
· 2019
Research
Talk
Open →
2019-11
44:55
Malware Behavior Catalog
Desiree Beck
Haley Bui-Nguyen
BSides DC
· 2019
Research
Empirical Research
Methodology
Talk
Open →
2019-10
46:48
Detecting Malicious Websites using Machine Learning
Ajit Thyagarajan
Andrew Beard
BSides DC
· 2016
Research
Technical
Detection Engineering
Network Security
Talk
Open →
2016-10
24:54
Taking DMA attacks to the next level
Anna Trikalinou
Dan Lake
BSides PDX
· 2018
Research
Technical
Advanced
Talk
Open →
2018-03
26:43
Pwning Android Apps at Scale
Sparsh
Shashank
BSides Ahmedabad
Research
Technical
Mobile Security
Supply Chain Security
Vulnerability Research
Advanced
Red
Case Studies and Incidents Analysis
+2
Open →
2023-02
25:08
Behind Enemy Lines by Ido Rozen
Ido Rozen
BSides TLV
· 2022
Research
Malware Analysis
Threat Intel
Web AppSec
Talk
Open →
2022-07
42:23
Not All Vulnerabilities Are The Same
Shubham Shah
BSides Canberra
· 2025
Research
Vulnerability Research
Web AppSec
Keynote
Open →
2025-12
59:16
0-day Research Disassembled
Chris Lyne
David Wells
Jimi Sebree
BSides DC
· 2019
Research
Advanced
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2019-11
27:55
A Decade of Low-Hanging Fruit in the Linux Kernel
Kees Cook
BSides PDX
· 2024
Research
Keynote
Open →
2024-11
25:38
Race Against the Machine: Rapid Exploit Development via LLMs
Matthew Deluca
BSides Augusta
· 2023
Research
Technical
AI Security
Vulnerability Research
Empirical Research
Technical Deep-dives
Talk
Open →
2023-10
45:11
Keynote: "When Exploits Aren't Binary" - Maddie Stone, BSides Canberra 2023
Maddie Stone
BSides Canberra
· 2023
Research
Keynote
Open →
2023-10
25:10
All Your Containers Are Belong to Us
James Condon
BSidesSF
· 2019
Research
Cloud IAM
Empirical Research
Talk
Open →
2019-03
25:31
NLP for Security Log Analysis: Learning to Crawl Before You Run
Arjun Chakraborty
BSidesSF
· 2023
Research
Technical
AI Security
Detection Engineering
Talk
Open →
2023-05
48:43
Inside Google's Discovery & Remediation of a Critical CPU Vulnerability
Yousif Hussin
BSides Lisbon
· 2024
Research
Technical
Advanced
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2024-12
26:27
What would Quantum Computing and Machine Learning do to crypto?
Dr. Najwa Aaraj
BSides Athens
· 2021
Research
Technical
Cryptography
Technical Deep-dives
Keynote
Open →
2021-07
26:35
Lazarus On The Rise: Insights From SWIFT Bank Attacks
Saher Naumaan
BSides Belfast
· 2018
Research
Case Studies and Incidents Analysis
Talk
Open →
2018-10
55:44
Reality Lost: Deepfakes Changing the Face of Attacks
Alyssa Miller
BSides Knoxville
· 2020
Research
Technical
Talk
Open →
2020-05
28:13
An Open Source Malware Classifier and Dataset
Phil Roth
BSidesSF
· 2018
Research
Empirical Research
Technical Deep-dives
Talk
Open →
2018-04
27:44
To Protect and Control: The Militarization of the Internet
Jared Naude
BSides Cape Town
· 2025
Policy
Research
Privacy
Supply Chain Security
Threat Intel
Talk
Open →
2025-12
35:12
Hardware Hacking the Internet of Things (IoT)
Deral Heiland
BSides Belfast
· 2025
Research
Technical
Methodology
Technical Deep-dives
Talk
Open →
2025-02
38:36
Put Words In My Mouth
Amy Manià
BSides Cape Town
· 2019
Research
Technical
IoT
Social Engineering
Red
Talk
Open →
2019-12
33:04
A Dive into the Future of Brain Computer Interfaces
Kai Frost
BSides Perth
· 2023
Research
Technical
Talk
Open →
2023-08
58:26
I for one welcome our new Cyber Overlords! An intro to ML in cybersecurity
BSides Lisbon
· 2016
Research
Technical
Intro
Empirical Research
Technical Deep-dives
Talk
Open →
2016-11
43:15
Spectre and Meltdown: Speculative Execution Considered Harmful
Yuval Yarom
BSides Canberra
· 2018
Research
Advanced
Talk
Open →
2018-05
50:28
Estonian Electronic Identity Card and its Security Challenges
Arnis Paršovs
BSides Tallinn
· 2021
Research
Cryptography
DFIR
Advanced
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2021-10
47:54
Password Cracking Beyond 15 Characters and Under $500
Travis Palmer
BSides Knoxville
· 2020
Research
Technical
Cryptography
Talk
Open →
2020-05
52:37
Fog of War: Diverse Information Operations in Modern Warfare
Sanaz Yashar
BSides TLV
· 2021
Research
Keynote
Open →
2021-08
34:35
Game Theory For Hackers
Lindsay Von Tish
BSides SATX
· 2019
Research
Technical
Talk
Open →
2019-09
8:38:00
Cyber Crash Investigations: Seizing the Opportunity to Learn from Fast Crisis
Julia Wigton
David Stokes
BSides Las Vegas
· 2023
Research
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2023-08
39:52
Defensive Security Research is Sexy too (& Real Sign of Skill)
Ollie Whitehouse
BSides London
· 2014
Research
Methodology
Technical Deep-dives
Talk
Open →
2014-05
12:34
Exploring The Dark Web: Forums, Markets, And Scam Insights
Stefan Bargan
BSides London
· 2025
Research
Talk
Open →
2024-02
40:57
The Noob Persistent Threat
Allison Nixon
Brandon Levene
BSides Boston
· 2013
Research
Talk
Open →
2013-06
40:43
Digital Forensics: The Missing Piece of Internet of Things Promise
Ali Dehghantanha
BSides Manchester
· 2017
Research
DFIR
IoT
Talk
Open →
2017-08
40:14
When Malware Becomes Creative: A Survey of Advanced Android Detection Evasion Tactics
Dimitrios Valsamaras
José Leitão
BSides Lisbon
· 2024
Research
Advanced
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2024-11
44:00
The Nation State Actor Ate My Homework!
Liam Smit
BSides Cape Town
· 2019
Research
Hardware Security
Malware Analysis
Reverse Engineering
Threat Intel
Advanced
Case Studies and Incidents Analysis
Empirical Research
+2
Open →
2019-12
26:12
GT - The New Cat and Mouse Game: Attacking and Defending Machine Learning Based Software - Joshua Sa
Joshua Saxe
BSides Las Vegas
· 2017
Research
Technical
AI Security
Malware Analysis
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2017-09
32:13
What We Can Learn from Google's Fight with Phishing
Neal Mueller
BSidesSF
· 2018
Research
Web AppSec
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2018-04
43:53
Pwning Electric Motorcycles
Mitchell Marasch
Persephone Karnstein
BSides Seattle
· 2026
Research
Technical
Hardware Hacking
Reverse Engineering
Vulnerability Research
Advanced
Red
Case Studies and Incidents Analysis
+2
Open →
2026-03
46:11
Insane in the Supply Chain: Threat modeling for attacks on AI systems
Eoin Wickens
Marta Janus
BSidesSF
· 2024
Research
Supply Chain Security
Talk
Open →
2024-07
40:43
Detecting Malicious Certificates Using Machine Learning
Abhishek Sharma
Khaled Al-Hassanieh
Jason Reaves
BSides DC
· 2017
Research
Technical
Cryptography
Malware Analysis
Threat Intel
Talk
Open →
2017-10
45:39
LightBasin: A Roaming Threat To Telecommunications Companies by Stuart Davis
Stuart Davis
BSides Dublin
· 2023
Research
Cellular Security
Talk
Open →
2023-07
26:00
Exposed Secrets — How Public Git Repositories and Docker Images Expose Millions of Secrets
Mackenzie Jackson
BSidesSF
· 2022
Research
DFIR
Supply Chain Security
Threat Intel
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2022-07
36:09
Insecurity through Censorship: Vulnerabilities Caused by The Great Firewall, S Shah & M Gianarakis
S Shah
M Gianarakis
BSides Canberra
Research
Technical
Cellular Security
Red
Technical Deep-dives
Talk
Open →
2024-10
47:19
Attacking Patient Health: The Anatomy of Hospital Exploitation
Jacob Holcomb
BSides DC
· 2016
Research
Technical
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2016-10
34:12
Why bother assessing popular software?
James Loureiro
David Middlehurst
BSides London
· 2015
Research
Talk
Open →
2015-07
41:09
Blowing up Gas Stations for fun and profit
Pedro Umbelino
BSides Lisbon
Research
Technical
Advanced
Red
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2024-11
45:33
The State of Blockchain Security - 2023 Edition
Peter Kacherginsky
BSidesSF
· 2023
Research
Talk
Open →
2023-05
48:22
An Attack & a Defense in the Context of Security of Digital ICs
Mahesh Tripunitara
BSides Toronto
· 2015
Research
Technical
Hardware Hacking
Vulnerability Research
Advanced
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2015-11
53:12
AI and Machine Learning in Network Security - Igor Mezic
Igor Mezic
BSides KC
· 2022
Research
Technical
AI Security
Detection Engineering
Network Security
Talk
Open →
2022-10
29:53
Google Pay, Drug Bots, & SIM Swaps: How Old Leaks Power New Attacks
Sarit Yerushalmi
Ron Masas
BSides London
· 2025
Research
Technical
OSINT
Social Engineering
Vulnerability Research
Web AppSec
Advanced
Case Studies and Incidents Analysis
+2
Open →
2026-03
35:43
Hashing the $#!+ out of firmware
Brent Shaw
BSides Cape Town
· 2019
Research
Hardware Security
IoT
Vulnerability Research
Talk
Open →
2019-12
35:45
Breaking The Impossible: Bypassing Android's Secure Hardware Backed Attestation by Joseph Foote
Joseph Foote
BSides Basingstoke
· 2022
Research
Technical
Mobile Security
Reverse Engineering
Vulnerability Research
Advanced
Red
Talk
Open →
2022-07
26:00
The Future of Computer Security
Kevin Shekleton
BSides KC
· 2021
Research
Cryptography
Talk
Open →
2021-11
58:25
2038 Isn't A Future Issue — Get That Through Your Thick Skull
Trey Darley
Pedro Umbelino
BSides Lisbon
· 2025
Policy
Research
IoT
Vulnerability Research
Talk
Open →
2025-12
31:30
Keep it Like a Secret: When Android Apps Contain Private Keys
Will Dormann
BSidesSF
· 2018
Research
Cryptography
Mobile Security
Supply Chain Security
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2018-04
15:28
No Distribute Scanners:
Florian Murschetz
Mathieu Gaucheler
BSides Munich
· 2021
Research
Malware Analysis
OSINT
Threat Intel
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2021-06
26:50
Digital Transformation of the Illicit Economy and Outsourced Crime Providers
Bex Nitert
BSides Perth
· 2021
Research
War Stories
Case Studies and Incidents Analysis
Talk
Open →
2021-09
41:19
Keeping CTI on Track: An Easier Way to Map to MITRE ATT&CK
Jackie Lasky
BSides DC
· 2019
Research
Technical
Blue
Methodology
Technical Deep-dives
Demo
Talk
Open →
2019-10
25:31
An analysis of data leaks in Kosovo's Universities - Kastriot Fetahaj
Kastriot Fetahaj
BSides Prishtina
· 2023
Research
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2023-05
55:37
Tales from the Cybercrime Battlefield
Ian Thornton-Trump
BSides Leeds
· 2018
Research
War Stories
Talk
Open →
2018-01
39:09
Deep Adversarial Architectures for Detecting and Generating Maliciousness
Hyrum Anderson
BSides Las Vegas
· 2016
Research
Technical
AI Security
Malware Analysis
Technical Deep-dives
Talk
Open →
2016-08
41:31
The GenAI Cybercrime Armageddon - Hype or Fiction?
Candid Wuest
BSides Lisbon
· 2024
Research
Talk
Open →
2024-11
27:20
Panda Mirror: How the Chinese CCP Manipulates NPM to Hoard Malware
Paul McCarty
BSides Canberra
· 2025
Research
Technical
Malware Analysis
Supply Chain Security
Threat Intel
Talk
Open →
2025-12
1:00:18
Scaling the Security Researcher to Eliminate OSS Vulnerabilities
Jonathan Leitschuh
Bsides CT
· 2023
Research
Technical
Supply Chain Security
Tooling
Vulnerability Research
Case Studies and Incidents Analysis
Technical Deep-dives
Keynote
Open →
2023-10
22:22
What the Yandex Leak Tells Us About How Big Tech Uses Your Data
Kaileigh McCrea
BSides Las Vegas
· 2023
Research
OSINT
Privacy
Threat Intel
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2023-10
28:36
Is this binary Naughty or Nice? How Google leverages ML and Santa to detect persistence on MacOS
Kristin Smith
BSides Canberra
· 2025
Research
Technical
Advanced
Talk
Open →
2025-11
31:07
Should I Pay or Should I Go? Game Theory and Ransomware
Tony Martin-Vegue
BSidesSF
· 2017
Research
Talk
Open →
2017-03
29:35
The Bucket List: Experiences Operating S3 Honeypots
Cameron Ero
BSidesSF
· 2018
Research
Cloud IAM
Threat Intel
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2018-04
51:16
Rosetta 2: Keeping Mac Malware Alive for Years to Come
Raphaela Mettig
Charles Glass
BSides Dallas/Fort Worth
· 2022
Research
Technical
DFIR
Malware Analysis
Reverse Engineering
Advanced
Empirical Research
Technical Deep-dives
+1
Open →
2022-11
1:02:20
When will a quantum computer be able to crack modern encryption and what should we do about it?
Rajiv Shah
BSides Canberra
· 2025
Research
Technical
Cryptography
Talk
Open →
2025-12
42:21
Now You C(&C), Now You Don't
Amichai Shulman
Stav Shulman
BSides TLV
· 2022
Research
Technical
Malware Analysis
Network Security
Threat Intel
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2022-07
34:45
BSidesSF 2018 - Crimeware Chaos: Empirical Analysis of HTTP-Based Botnet C&C Panels (Aditya K Sood)
Aditya K Sood
BSidesSF
· 2018
Research
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2018-04
56:59
Clustering Of Web Attacks: A Walk Outside The Lab
Gilad Yehudai
BSides Leeds
· 2018
Research
Web AppSec
Empirical Research
Technical Deep-dives
Talk
Open →
2018-01
21:37
How We Got Into A Unicorn's Private Codebase
Ashikka Gupta
Arshit Jain
BSides Munich
Research
Technical
Mobile Security
Supply Chain Security
Vulnerability Research
Red
Case Studies and Incidents Analysis
Empirical Research
+1
Open →
2022-05
21:00
Krisztian Gado - A Game Theoretic Analysis of TOR's Resilience to Entry-Exit and End-to-End Attacks
Krisztian Gado
BSides PDX
· 2019
Research
Advanced
Technical Deep-dives
Talk
Open →
2019-11
15:11
Analysis of the GR TLD Cyber Espionage Operation
Anastasios Pingios
BSides Athens
· 2021
Research
Case Studies and Incidents Analysis
Talk
Open →
2021-07
30:51
Sergey Shykevich - What malware to use? – Cybercriminal’s perspective
Sergey Shykevich
BSides TLV
· 2021
Research
Talk
Open →
2021-08
24:37
Androzoo APK Search: A Search Service Of Meta-Data
Médéric Hurier
BSides Luxembourg
· 2018
Research
Talk
Open →
2018-10
50:38
Getting Insight Out Of and Back Into Deep Neural Networks
Richard Harang
BSides Las Vegas
· 2017
Research
Technical
Talk
Open →
2017-08
39:24
5 Gaps Exposed In 30+ Real-World Tabletop Exercises - Ashu Savani
Ashu Savani
BSides London
· 2025
Research
Technical
Detection Engineering
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2026-03
36:18
Operation CuckooBees: Deep-Dive into Stealthy Winnti by Ofir Ozer, Niv Yona and Chen Erlich
Ofir Ozer
Niv Yona
Chen Erlich
BSides TLV
· 2022
Research
Talk
Open →
2022-07
31:50
Who Makes the Rules?
Meghna Vikram
BSides Knoxville
Research
Technical
AI Security
Supply Chain Security
Vulnerability Research
Empirical Research
Technical Deep-dives
Talk
Open →
2024-07
27:32
Behind the Curtain of Dark Web and Cybercrime Operations
Alexander Wilczek
BSides Canberra
· 2025
Research
Technical
Cryptography
DFIR
Threat Intel
Talk
Open →
2025-12
19:30
Intercepting Sensitive Data in Smartphone App Network Connections
Eirini Anthi
BSides Athens
· 2017
Research
Technical
Talk
Open →
2017-10
25:14
Password Surveys are Shit!
Per Thorsheim
BSides Las Vegas
· 2022
Research
Methodology
Surveys and Landmarks
Talk
Open →
2022-09
57:27
Security AI in the Real World: Lessons from Deploying ML at Scale
Joshua D Saxe
BSides Las Vegas
· 2022
Research
Technical
AI Security
Malware Analysis
Threat Intel
Talk
Open →
2022-09
49:46
Hacking Non-Traditional Systems
Luis Santana
BSides Orlando
· 2013
Research
Technical
IoT
Physical Security
Vulnerability Research
Talk
Open →
2013-04
34:02
An Adversarial View of SaaS Malware Sandboxes
Jason Trost
Aaron Shelmire
BSides DC
· 2015
Research
Technical Deep-dives
Talk
Open →
2015-11
18:31
Operation PZCHAO
Ivona-Alexandra Chili
BSidesSF
· 2019
Research
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2019-03
27:26
Fuzzing USB With Raw Gadget by Andrey Konovalov
Andrey Konovalov
BSides Munich
· 2023
Research
Technical
Hardware Hacking
Vulnerability Research
Demo
Talk
Open →
2023-10
1:01:05
When the Magic Wears Off: Flaws In ML For Security Evaluations - Lorenzo Cavallaro
Lorenzo Cavallaro
BSides London
Research
Advanced
Empirical Research
Methodology
Talk
Open →
2019-06
22:49
Taking D-Bus to Explore the Bluetooth Landscape
Paul Wortman
BSides Las Vegas
· 2024
Research
Technical
Reverse Engineering
Wireless Security
Advanced
Empirical Research
Technical Deep-dives
Talk
Open →
2024-09
37:51
Demystifying APT42 Cyberoperations - Adrian Sanchez Hernandez & Asli Koksal
Adrian Sanchez Hernandez
Asli Koksal
BSides Dublin
Research
Talk
Open →
2024-06
43:31
A Retrospective: Security Incidents and Lessons from 2018
Jared Naude
BSides Cape Town
· 2018
Research
Talk
Open →
2019-04
View all 405 talks tagged Research →