Home
About
What is BSides?
CFP Guide
Talks
Contact
Light
← All talks
Category
Research talks at BSides
65 talks tagged
Research
from 26 chapters of BSides events worldwide.
Related topics
Technical Deep-dives
Empirical Research
Case Studies and Incidents Analysis
Methodology
Talk
Cryptography
35:36
(Perfect) Cell Games: You Thought It Was Just Surveillance...
Mike Curnow
Bsides CT 2025
Research
Technical
Cellular Security
Wireless Security
Advanced
Red
Technical Deep-dives
Talk
YouTube ↗
2025-12
44:22
Diamond Model for Intrusion Analysis: What You Need to Know
Andy Pendergast
BSides DC
· 2014
Research
Methodology
Talk
YouTube ↗
2014-10
44:55
Malware Behavior Catalog
Desiree Beck
Haley Bui-Nguyen
BSides DC
· 2019
Research
Talk
YouTube ↗
2019-10
59:16
0-day Research Disassembled
Chris Lyne
David Wells
Jimi Sebree
BSides DC
· 2019
Research
Case Studies and Incidents Analysis
Methodology
Talk
YouTube ↗
2019-11
25:38
Matthew Deluca - Race Against the Machine: Rapid Exploit Development via LLMs
Matthew Deluca
BSides Augusta
Research
Technical
Talk
YouTube ↗
2023-10
25:10
All Your Containers Are Belong to Us
James Condon
BSidesSF
· 2019
Research
Empirical Research
Talk
YouTube ↗
2019-03
48:43
Inside Google's Discovery & Remediation of a Critical CPU Vulnerability
Yousif Hussin
BSides Lisbon
· 2024
Research
Technical
Talk
YouTube ↗
2024-12
26:27
What would Quantum Computing and Machine Learning do to crypto?
Dr. Najwa Aaraj
BSides Athens
· 2021
Research
Technical
Cryptography
Keynote
YouTube ↗
2021-07
28:13
An Open Source Malware Classifier and Dataset
Phil Roth
BSidesSF
· 2018
Research
Talk
YouTube ↗
2018-04
35:12
Hardware Hacking the Internet of Things (IoT)
Deral Heiland
BSides Belfast
· 2025
Research
Technical
Talk
YouTube ↗
2025-02
50:28
Estonian Electronic Identity Card and its Security Challenges
Arnis Paršovs
BSides Tallinn
Research
Talk
YouTube ↗
2021-10
39:52
Defensive Security Research is Sexy too (& Real Sign of Skill)
Ollie Whitehouse
BSides London
· 2014
Research
Talk
YouTube ↗
2014-05
40:14
When Malware Becomes Creative: A Survey of Advanced Android Detection Evasion Tactics
Dimitrios Valsamaras
José Leitão
BSides Lisbon
Research
Talk
YouTube ↗
2024-11
32:13
What We Can Learn from Google's Fight with Phishing
Neal Mueller
BSidesSF
· 2018
Research
Talk
YouTube ↗
2018-04
26:00
BSidesSF 2022 - Exposed secrets - How public git repositories and Docker... (Mackenzie Jackson)
Mackenzie Jackson
BSidesSF
· 2022
Research
Talk
YouTube ↗
2022-07
47:19
Attacking Patient Health: The Anatomy of Hospital Exploitation
Jacob Holcomb
BSides DC
· 2016
Research
Technical
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
YouTube ↗
2016-10
41:09
Blowing up Gas Stations for fun and profit
Pedro Umbelino
BSides Lisbon
Research
Technical
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
YouTube ↗
2024-11
31:30
Keep it Like a Secret: When Android Apps Contain Private Keys
Will Dormann
BSidesSF
· 2018
Research
Talk
YouTube ↗
2018-04
41:19
Keeping CTI on Track: An Easier Way to Map to MITRE ATT&CK
Jackie Lasky
BSides DC
· 2019
Research
Technical
Demo
Talk
YouTube ↗
2019-10
25:31
An analysis of data leaks in Kosovo's Universities - Kastriot Fetahaj
Kastriot Fetahaj
BSides Prishtina
Research
Talk
YouTube ↗
2023-05
29:35
The Bucket List: Experiences Operating S3 Honeypots
Cameron Ero
BSidesSF
· 2018
Research
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
YouTube ↗
2018-04
34:45
BSidesSF 2018 - Crimeware Chaos: Empirical Analysis of HTTP-Based Botnet C&C Panels (Aditya K Sood)
Aditya K Sood
BSidesSF
· 2018
Research
Talk
YouTube ↗
2018-04
21:00
Krisztian Gado - A Game Theoretic Analysis of TOR's Resilience to Entry-Exit and End-to-End Attacks
Krisztian Gado
BSides PDX
Research
Technical Deep-dives
Talk
YouTube ↗
2019-11
34:02
An Adversarial View of SaaS Malware Sandboxes
Jason Trost
Aaron Shelmire
BSides DC
· 2015
Research
Talk
YouTube ↗
2015-11
1:01:05
When the Magic Wears Off: Flaws In ML For Security Evaluations - Lorenzo Cavallaro
Lorenzo Cavallaro
BSides London
Research
Empirical Research
Methodology
Talk
YouTube ↗
2019-06
23:31
BSidesSF 2022 - Rise of the Vermilion ... (Avigayil Mechtinger • Ryan Robinson)
Avigayil Mechtinger
Ryan Robinson
BSidesSF
· 2022
Research
Blue
Case Studies and Incidents Analysis
Talk
YouTube ↗
2022-07
42:53
A Special Class Of Stream Cipher Backdooring Techniques
Eric Filiol
BSides Lisbon
· 2019
Research
Cryptography
Talk
YouTube ↗
2019-12
26:52
BSidesSF 2018 - Supply Chain Attack Through CCleaner (Itai Tevet)
Itai Tevet
BSidesSF
· 2018
Research
Supply Chain Security
Talk
YouTube ↗
2018-04
44:58
The Inception Framework: Cloud Based Attack
Waylon Grange
BSides SLC
· 2015
Research
Talk
YouTube ↗
2015-04
44:47
Email security with DANE: Empirical Analysis of DANE for SMTP in the wild
Aniketh Girish
BSides Delhi
· 2020
Research
Empirical Research
Technical Deep-dives
Talk
YouTube ↗
2020-11
30:42
Malware, Cats and Cryptography
Zhassulan Zhussupov
BSides Sofia
Research
Cryptography
Talk
YouTube ↗
2024-04
22:45
Clearing the FOG: Unveiling the Latest Ransomware Trickery
Sam Mayers
BSides PDX
Research
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
YouTube ↗
2024-11
19:25
Securing DNSSEC with Ritual and Ceremony
Smiljana Antonijevic
BSidesSF
· 2018
Research
Cryptography
Talk
YouTube ↗
2018-04
47:30
My Journey to find vulnerabilities in macOS
Mikko Kenttäla
BSides Tallinn
Research
Talk
YouTube ↗
2022-10
53:27
Olivier Bilodeau - Unparalleled Remote Desktop Monitoring Reveal Attackers Tradecraft
Olivier Bilodeau
BSides Augusta
Research
Case Studies and Incidents Analysis
Empirical Research
Talk
YouTube ↗
2023-10
51:17
Uncloaking Cloak Ransomware
Jeff White
BSides Tampa
Research
Talk
YouTube ↗
2025-07
57:52
Why We Research
Marion Marschalek
BSides PDX
· 2024
Research
Keynote
YouTube ↗
2024-11
43:10
Parser Differentials
Imre Rad
BSides Budabest
· 2023
Research
Talk
YouTube ↗
2023-07
18:04
Using Deep Learning to Undermine Tor
Matt Wright
BSidesROC
· 2019
Research
Talk
YouTube ↗
2019-03
39:54
Exploiting arbitrary class loading on the JVM
Teddy Thobane
BSides Joburg
· 2025
Research
Technical
Talk
YouTube ↗
2025-09
37:00
Malware, Cats and Cryptography - Zhassulan Zhussupov
Zhassulan Zhussupov
BSides Prishtina
Research
Technical
Cryptography
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
YouTube ↗
2024-09
26:06
DarkEngine: Conducting Research into a Highly Orchestrated Phishing Campaign
Liam Wilkinson
BSides Canberra
Research
Talk
YouTube ↗
2025-12
25:29
From A Simple Log To Sophisticated Crypter - Hido Cohen and Arnold Osipov
Hido Cohen
Arnold Osipov
BSides Munich
· 2022
Research
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
YouTube ↗
2022-05
29:11
Malware Code Similarity Through Vectorsearch - Remco Sprooten
Remco Sprooten
BSides Belfast
· 2025
Research
Technical
Talk
YouTube ↗
2025-02
37:22
Large-scale Security Analysis of IoT Firmware
Daniel Nussko
BSides Budabest
· 2021
Research
Talk
YouTube ↗
2022-03
36:54
Lost in Translation? Making Pentest Reports Speak the Client's Language
Maria P Murumaa
Katarina Galanska
BSides Tallinn
Research
Talk
YouTube ↗
2025-10
27:05
I Own your Cluster - Taking over AWS clusters using Chain Attack
Chen Shiri
BSides TLV
· 2024
Research
Technical
Advanced
Talk
YouTube ↗
2024-08
1:48:57
0-day Research Disassembled
Chris Lyne
BSides DC
· 2019
Research
Advanced
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
YouTube ↗
2019-10
47:34
Threat Actors Interest in AI - Separating Hype from Reality
Rachel James
BSides PDX
· 2024
Research
Talk
YouTube ↗
2024-11
17:54
T8 - Bots Combine! : Behind the Modern Botnet, Andrea Scarfo (@AScarf0)
Andrea Scarfo
BSides Amsterdam
· 2017
Research
Talk
YouTube ↗
2017-09
25:10
Breaking Windows with your ARM
Rotem Salinas
BSides TLV
· 2024
Research
Technical Deep-dives
Talk
YouTube ↗
2024-08
41:59
Stalking Known Opensource Offenders for Novel CVEs
Will Porter
Bsides CT
· 2020
Research
Talk
YouTube ↗
2020-11
48:27
A Novel Runtime Technique For Identifying Malicious Applications
Chris Le Roy
BSides Lisbon
· 2018
Research
Talk
YouTube ↗
2018-12
45:44
Developing a cybersecurity framework for commercial banks in South Africa - Tlhologelo Mphahlele
Tlhologelo Mphahlele
BSides Joburg
Research
Talk
YouTube ↗
2024-10
52:03
Two Notify All
David Maynor
Danny Adamitis
BSides Augusta
· 2018
Research
Talk
YouTube ↗
2018-11
43:30
Hype vs. Hands-On: What GenAI Actually Brings to ID & Response
Marvin Ngoma
BSides Tallinn
Research
Empirical Research
Talk
YouTube ↗
2025-10
45:28
Building The ATT&CK Pipeline For Linux - Tim Wadhwa-Brown
Tim Wadhwa-Brown
BSides London
· 2025
Research
Technical
Talk
YouTube ↗
2025-02
32:36
Navigating The Open-Source Security Fog: A Case Study Of Messy Vulnerability Data
Jamie Harris
BSides Belfast
Research
Case Studies and Incidents Analysis
Talk
YouTube ↗
2024-03
22:12
Digging and delving in DNS
Barry Irwin
BSides Oslo
· 2022
Research
Talk
YouTube ↗
2023-01
45:09
Seeing Through The Deception - A Model for Detecting High Interaction Honeypots in the Wild
Jason Pittman
BSides RDU
· 2021
Research
Talk
YouTube ↗
2021-10
30:20
State of GraphQL Security 2023
Swan Beaujard
Gautier Ben Aïm
BSides Oslo
· 2023
Research
Empirical Research
Technical Deep-dives
Talk
YouTube ↗
2025-07
56:40
Delving into Medical Device Digital Forensics
Emlyn Butterfield
Veronica Schmitt
BSides Oslo
Research
Technical
Talk
YouTube ↗
2025-07
36:41
Lessons Learned from Building & Running MHN, a Crowd-sourced Honeynet
Jason Trost
BSidesSF
· 2015
Research
Talk
YouTube ↗
2023-12
23:27
Building a Better Grid
Jason Gilam
BSides Charlotte
· 2026
Research
Technical
Web AppSec
Talk
YouTube ↗
2026-04
34:25
MITRE Attack Flow: Laying Foundations for Predictive Intelligence
BSides Edmonton
· 2024
Research
Talk
YouTube ↗
2025-10