09:30-10:00 | UB4.132
Syd: An Introduction to Secure Application Sandboxing for Linux
Ali Polatel
10:00-10:30 | UB4.132
Tightening every bolt
Daniel Stenberg
10:30-11:00 | UB4.132
Kintsugi: A Decentralized E2EE Key Recovery Protocol
Emilie Ma
11:00-11:30 | UB4.132
Nothing to see here - practical advice to avoid tunnel vision and similar decloaking techniques against VPNs
Till Maas
11:30-12:00 | UB4.132
The SELinux problem that cast a months long shadow
Matyas Horky
12:00-12:30 | UB4.132
A Practical Introduction to using sq, Sequoia PGP's CLI
Neal H. Walfield
12:30-13:00 | UB4.132
Using DPoP to use access tokens securely in your Single Page Applications
Alexander Schwartz, Takashi Norimatsu
13:00-13:30 | UB4.132
Breaking Barriers: The Art of (Free) Gamified Security Training
Joseph Katsioloudes
13:30-14:00 | UB4.132
TKey, an open source/open hardware security token for SSH et c
Michael Cardell Widerkrantz
14:00-14:30 | UB4.132
Hardware backed SSH keys: ssh-tpm-agent
Morten Linderud
14:30-15:00 | UB4.132
Sigsum: Detecting rogue signatures through transparency
Niels Möller
15:00-15:30 | UB4.132
An overview on detecting Login Anomalies with BuffaLogs
Federico Foschini, Lorena Goldoni
15:30-16:00 | UB4.132
Managing Vulnerabilities in Open-Source Dependencies
Eva Sarafianou
16:00-16:30 | UB4.132
What if Log4Shell were to happen today?
Piotr P. Karwasz
16:30-17:00 | UB4.132
How Threat Actors Are Weaponizing Your Favorite Open-Source Package Registry
Ian Kretz, Sebastián Obregoso
17:00-17:30 | UB4.132
Hunting for GitHub Actions bugs with zizmor
William Woodruff
17:30-18:00 | UB4.132
Enhancing artifact security with GitHub Artifact Attestations
Fredrik Skogman