Talks

avatar

Richard Buckland

Academic

Opening Ceremony

avatar

Dan Kienast

Academic

Hunting in the real world - basic of bug bounties and how to find them

avatar

Kate Rodionoff & Rose Rasaie

Industry

Case Study: Lessons from Incident Responders

avatar

Jay Patel

Student

Learning to Talk BS: the art of translating complex security issues to non-technical stakeholders

avatar

Adam Kowalik

Student

The impossibility of anonymity on social media

avatar

Break 1

avatar

Hammond Pearce

Academic

Hardware Hackademia - How We Teach Hardware Security at UNSW

avatar

Aidan Chng

Student

AI vs AI - How Hackers Use Machine Learning and How We Can Fight Back

avatar

Rainier Wu

Student

Intro to Blockchain (Smart Contract) Security

avatar

James Young

Academic

Introduction to reverse engineering on Apple platforms

avatar

Krish Chadha

Student

Quantum Cryptography

avatar

Tom McTavish

Student

Microwaves, Macrofun! An introduction to signals analysis and electromagnetic side channels

avatar

Break 2

avatar

Cameron McDonald

Student

Cracking a Custom Cryptographic Protocol by Travelling through Time

avatar

Chris Yoo

Student

Building an AI Pentester agent

avatar

UNSW SecSoc Conferences team

UNSW SecSoc

Closing Ceremony