Table of Contents

Presentations

Olivia Gallucci at Wild Wings Bird Sanctuary for Women in Cybersecurity 2
used on press post Mach-O Anatomy on Michael Tsai's blog. Also used on presentations and conferences page.

2026

TBD!

Coming soon!


🌸👋🏻 Join 10,000+ followers! Let’s take this to your inbox. You’ll receive occasional emails about whatever’s on my mind—offensive security, open source, boats, reversing, software freedom, you get the idea.


Galaport promenade in Instanbul, Turkey. Used on personal training page.

2025

10 December: Datadog Security Summit
  • Talk: macOS Internals for Threat Detection Engineers: Logs, ESF, and Automation Utility Risks
  • Duration: 25 minutes

Description

This presentation explores macOS’s security telemetry mechanisms, answering how macOS logging operates through the Unified Logging System (ULS), Endpoint Security Framework (ESF), and Transparency, Consent, and Control database (TCC.db) structures. It details techniques for extracting actionable telemetry from macOS logs using tools like Consolation3 and eslogger, and highlights the complexities of ESF-based interactions. The talk analyzes macOS threat vectors within automation utilities—such as LaunchAgent, LoginItem, and OSA script-based persistence and credential theft—as exploited by malware like Atomic Stealer and XCSSET. Detection strategies are proposed that focus on behavioral correlations—such as abnormal osascript execution, high-entropy command-line arguments, and post-execution network exfiltration—while leveraging tools like ESFPlayground, Mints, and Mac Monitor for telemetry collection and analysis. The talk provides attendees with the internals, telemetry, and tooling knowledge needed to investigate and harden macOS environments.

5 December: Datadog Security Monthly
  • Talk: Porting Linux Exploits to macOS
  • Duration: 30 minutes

Abstract

The presentation examines how different OS architectures, particularly Linux and BSD, shape the techniques used in binary exploitation. It begins by highlighting the foundational systems and standards—System V, POSIX, BSD, UNIX, and Linux—that influence an OS’s behavior and security mechanisms like memory management, calling conventions, and stack management. Key topics include the System V application binary interface (ABI), which governs function calls and stack management, and POSIX standards, which ensure cross-platform exploit portability. The presentation explores UNIX philosophy’s emphasis on simplicity and modularity, showing how patterns can help us think about vulnerabilities. The section about BSD’s influence focuses on advanced memory management techniques that impact exploit strategies.

The presentation also covers OS security features (e.g., ASLR, Write XOR Execute (W^X), and stack canaries), and how to bypass them. It delves into exploiting system calls for privilege escalation, using a case study surrounding Shellshock (CVE-2014-6271) and how it relates to recent memory corruption issues. A comparison of SysV and BSD mechanics shows differences in calling conventions, stack management, and system calls—all of which affect exploit development. In conclusion, the presentation displays why an OS’s architecture can make or break successful binary exploitation, even if techniques themselves are theoretically viable.

20-21 November: BSides Ottowa
  • Talk: Syscalls and Stacks: A Guide to Cross-Platform Exploitation on macOS and Linux
  • Duration: 30 Minutes
  • Slides as PDF
  • Website

Description

The presentation examines how different OS architectures, particularly Linux and BSD, shape the techniques used in binary exploitation. It begins by highlighting the foundational systems and standards—System V, POSIX, BSD, UNIX, and Linux—that influence an OS’s behavior and security mechanisms like memory management, calling conventions, and stack management. Key topics include the System V application binary interface (ABI), which governs function calls and stack management, and POSIX standards, which ensure cross-platform exploit portability. The presentation explores UNIX philosophy’s emphasis on simplicity and modularity, showing how patterns can help us think about vulnerabilities. The section about BSD’s influence focuses on advanced memory management techniques that impact exploit strategies.

The presentation also covers OS security features (e.g., ASLR, Write XOR Execute (W^X), and stack canaries), and how to bypass them. It delves into exploiting system calls for privilege escalation, using a case study surrounding Shellshock (CVE-2014-6271) and how it relates to recent memory corruption issues. A comparison of SysV and BSD mechanics shows differences in calling conventions, stack management, and system calls—all of which affect exploit development. In conclusion, the presentation displays why an OS’s architecture can make or break successful binary exploitation, even if techniques themselves are theoretically viable.

11 – 19 October: Objective by the Sea
  • Talk: macOS Internals for Threat Detection Engineers: Logs, ESF, and Automation Utility Risks
  • Duration: 25 minutes
  • Slides as PDF
  • Website

Abstract

This presentation explores macOS’s security telemetry mechanisms, answering how macOS logging operates through the Unified Logging System (ULS), Endpoint Security Framework (ESF), and Transparency, Consent, and Control database (TCC.db) structures. It details techniques for extracting actionable telemetry from macOS logs using tools like Consolation3 and eslogger, and highlights the complexities of ESF-based interactions. The talk analyzes macOS threat vectors within automation utilities—such as LaunchAgent, LoginItem, and OSA script-based persistence and credential theft—as exploited by malware like Atomic Stealer and XCSSET. Detection strategies are proposed that focus on behavioral correlations—such as abnormal osascript execution, high-entropy command-line arguments, and post-execution network exfiltration—while leveraging tools like ESFPlayground, Mints, and Mac Monitor for telemetry collection and analysis. The talk provides attendees with the internals, telemetry, and tooling knowledge needed to investigate and harden macOS environments.

1st week of October: Surprise event NYC – Sprawl.nyc!
  • Secret!
17-19 September: BSides Cayman Islands (next year maybe!)
  • Talks was accepted, but I was unable to attend as the conference fell within the first three months of starting a new job, and I didn’t have prior approval for time off. Next year! :)
5 September: BSidesNEPA
  • Talk: The Anatomy of a Mach-O: A Structured Guide to macOS Internals
  • Duration: 20 minutes
  • Website
4 August: Diana Initiative (next year maybe!)
  • Talks was accepted, but I was unable to attend as the conference fell within the first three months of starting a new job, and I didn’t have prior approval for time off. Next year! :)

25-26 July: BSides Albuquerque (next year maybe!)
  • Talks was accepted, but I was unable to attend as the conference fell within the first three months of starting a new job, and I didn’t have prior approval for time off. Next year! :)

18 July: BSides CDMX (next year maybe!)
  • Both talks were accepted, but I was unable to attend as the conference fell within the first three months of starting a new job, and I didn’t have prior approval for time off. Next year! :)
11 July: BSides PGH (next year maybe!)
  • Talk was accepted, but I was unable to attend as the conference fell within the first three months of starting a new job, and I didn’t have prior approval for time off. Next year! :)

10 June: GRASSr00tz (next year maybe!)
  • Talk was accepted, but I was unable to attend as the conference fell within the first three months of starting a new job, and I didn’t have prior approval for time off. Next year! :)
7 June: BSides Buffalo
  • Unlocking macOS Internals: A Beginner’s Guide to Apple’s Open Source Code
  • Full schedule
  • Talk listing
  • Saturday 1:00 PM
  • Duration: 50 min
  • Location: SH-1008
  • Bio

Elevator pitch

Have you ever wondered how macOS works under the hood? For researchers, learning how to navigate Apple’s open source code is a game-changer. This talk demystifies macOS internals through its open source ecosystem, giving you everything you need to start hacking these machines!

Description

Have you ever wondered how macOS and iOS work under the hood? While Apple is known for its closed ecosystem, did you know that significant portions of macOS and iOS are open source—including security components? For security researchers, learning how to find, analyze, and use Apple’s open source code is a game-changer. In this talk, we’ll demystify macOS internals for beginners by breaking down Apple’s open source ecosystem—where to find it, how to navigate licensing limitations, and what components (continually) matter for security research.

We’ll explore techniques like binary analysis and extraction to uncover hidden references to source code. You’ll also learn how macOS and iOS share a common codebase! But it’s not always easy—these open source releases are often incomplete, outdated, or missing files. We’ll discuss challenges when compiling Apple’s open-source projects, troubleshooting errors, and making the most of these resources for reverse engineering. By the end of this session, you’ll have a solid foundation in macOS internals, understand how this open-source model impacts security, and gain practical skills to explore macOS from the inside out. If you’re curious about macOS internals, this talk will give you everything you need to know to start hacking these machines!

3-5 June: RVAsec
  • Unlocking macOS Internals: A Beginner’s Guide to Apple’s Open Source Code
  • Wednesday, 4 June 2025: 11:30am – 12:20pm EDT
  • Location: Downstairs, Madison / Jefferson / Monroe
  • 101 talks schedule
  • Talk listing
  • Bio

Abstract

Have you ever wondered how macOS works under the hood? For researchers, learning how to navigate Apple’s open source code is a game-changer. This talk demystifies macOS internals through its open source ecosystem, giving you everything you need to start hacking these machines!

1 June: BSides312
  • Unlocking macOS Internals: A Beginner’s Guide to Apple’s Open Source Code
  • Time: 2-2:30 pm
  • Duration: 30 minutes
  • Schedule
  • Speakers and bio
30 May: THOTCON
  • Elements of Cross-Platform Exploitation – A Guide
  • 30 minutes
  • Track 2: 1130 – TURBO.10 – “Elements of Cross-Platform Exploitation” – Olivia Gallucci
  • Website
  • Speaker list

Bio

Olivia Gallucci is an offensive security engineer, freelance penetration tester, and blogger: oliviagallucci.com. She is a student at the Rochester Institute of Technology. Outside of cybersecurity, Olivia enjoys competitive sailing, fitness, and books on famous nerds.

Abstract

Having trouble applying your Linux hacks to other OS-es? This presentation explores how an OS’s architecture influences binary exploitation. It delves into how the System V application binary interface (ABI), POSIX standards, and the UNIX philosophy shape the mechanics of binary exploitation. The talk highlights stack management, system calls, and security mechanisms, including address space layout randomization (ASLR), Write XOR Execute (W^X), and stack canaries. By comparing System V and BSD-derived systems, this presentation illustrates nuances of exploiting binaries across different, yet often similar platforms.

26 May: BSides Vancouver
  • Unlocking macOS Internals: A Beginner’s Guide to Apple’s Open Source Code
  • Monday, 26 May 2025: 2:00pm – 2:19pm PDT
  • Duration: 20 minutes
  • Location: Track 4
  • Bio
  • Listing
27 Feb: RIT Career Services – Panel

Two student panelists share their wisdom and insight on finding their first co-op. They also discuss their experiences on the job (i.e., challenges and successes) and anything else on the panelists’ minds relating to finding a co-op!

25 Feb: RIT Career Services – Panel

Two student panelists share their wisdom and insight on finding their first co-op. They also discuss their experiences on the job (i.e., challenges and successes) and anything else on the panelists’ minds relating to finding a co-op!

2023 FOSS alumn meet up at RIT. Used on Olivia Gallucci's photoblog.

2024

13 September: BSides Zadar – Cross-Platform Exploitation: How OS Architecture Shapes Binary Exploits
  • Was the 1st speaker at the 1st BSides Zadar conference! :D
  • This was talk No. 1 on the list
  • Not recorded
13 September: BSides Zadar – How Open Source SW Lifecycles, Vulnerabilities, and Community Dynamics affect Security
  • This was talk No. 2 on the list :)
  • Not recorded
4 May: LibrePlanet – GNU@NU: Building a Community in Education – Panel

Description

Nowadays, proprietary/non-free software has become nearly synonymous with educational establishments. Using software that is “the norm” or “industry standard” forces students to submit to proprietary applications “for the good of their future.” Tools for textbook access and homework assignment/submission force students to submit to subscription-based DRM models and forfeit any opportunity to own the knowledge contained within the textbooks. Big name companies, some of which are the biggest proponents of proprietary software, are considered the best on resumes, and students are encouraged to search for jobs at such conglomerates. GNU@NU, Northeastern’s free software organization is here to help! We will be holding a discussion on student experiences with free software, as they pertain to anything remotely educational. Come join us to help and learn more!

4 May: LibrePlanet – Ethical and Economic Dimensions of Free Software Security

Abstract

Organizations leverage free software for product development and procedural implementation. However, the cybersecurity industry often overlooks or misunderstands the free software community, resulting in significant gaps in security knowledge. This presentation delves into the intricate relationship between free software and closed-source vulnerabilities, explores free software lifecycles, and analyzes security trends within projects that adhere to or deviate from Freedom 3 (the right to redistribute modified programs). Additionally, it scrutinizes the social dynamics and economic factors contributing to the success of free software projects and communities.

This research aims to chronicle the evolution of free software projects, illustrate how organizations use free software projects, and identify effective security measures. Emphasizing the pivotal role of free software in cybersecurity, this presentation underscores elements such as documentation, collaboration, and human rights. Research methods included reviewing published research, journal articles, statistics, CVEs, and press articles about security threats and mitigations.

23 March: BSides Rochester – Exploit and Malicious Tool Development Utilizing Open Source Software

Description

This talk demystifies (legal) exploit development, providing attendees with a comprehensive understanding of how corporate and freelance hackers utilize open source software (OSS) for offensive purposes. Here, the audience will delve into the mechanics of exploit development using OSS. Additionally, participants will gain insights into the tools and platforms commonly employed in creating exploits, walking through a step-by-step development process. Real-world examples underscore the significance of incorporating OSS into cybersecurity practices and the potential consequences of neglecting this aspect. The final segment sheds light on the common misconceptions surrounding professional exploit development, and provides a nuanced perspective on the tools and techniques involved.

29 February: RIT Career Services – Panel
  • Panelists – Alex Beaver, Joe Abbate, and Olivia Gallucci

Three student panelists share their wisdom and insight on finding their first co-op. They also discuss their experiences on the job (i.e., challenges and successes) and anything else on the panelists’ minds relating to finding a co-op!

27 February: RIT Career Services – Panel

Three student panelists share their wisdom and insight on finding their first co-op. They also discuss their experiences on the job (i.e., challenges and successes) and anything else on the panelists’ minds relating to finding a co-op!

2023

31 October: RIT Career Services – Panel

Four student panelists share their wisdom and insight on finding their first co-op. They also discuss their experiences on the job (i.e., challenges and successes) and anything else on the panelists’ minds relating to finding a co-op!

12 August: DEF CON Recon Village – Tooling Presentation
12 August: DEFCON Recon Village – Red Team Panel
10 August: Black Hat Arsenal – Tooling Demonstration
2 March: RIT Career Services – Panel

Four student panelists share their wisdom and insight on finding their first co-op. They also discuss their experiences on the job (i.e., challenges and successes) and anything else on the panelists’ minds relating to finding a co-op!

2022

20 October: RIT Career Services – Panel

Four student panelists share their wisdom and insight on finding their first co-op. They also discuss their experiences on the job (i.e., challenges and successes) and anything else on the panelists’ minds relating to finding a co-op!

18 October: RIT Career Services – Panel

Four student panelists share their wisdom and insight on finding their first co-op. They also discuss their experiences on the job (i.e., challenges and successes) and anything else on the panelists’ minds relating to finding a co-op!

14 September: RIT’s Women in CyberSecurity (WiCyS) Student Chapter – How to Navigate the Career Fair and Job Postings
  • More information will be uploaded a later date
2 September: RITSEC – Navigating Scholarships
  • An unrecorded forty-minute presentation about my scholarship story and how to apply to scholarships strategically
  • 45-minute presentation
  • May create a blog post at a later date
17-19 March: WiCyS International Conference – Economics and Ethics Behind Successful Free & Open Source Security Projects
  • Fire Talk about research I did at Open@RIT (not Apple)
  • Learn more about the project here
WiCyS 2022 Lightning Talk - Economics and Ethics Behind Successful Free and Open Source Security Projects by Olivia Gallucci
21 January: RITSEC – Analyzing Tactics and Developmental Trends of Open Source Malware

🌸👋🏻 Join 10,000+ followers! Let’s take this to your inbox. You’ll receive occasional emails about whatever’s on my mind—offensive security, open source, boats, reversing, software freedom, you get the idea.


2021

3 December: RIT – Analyzing Tactics and Developmental Trends of Open Source Malware
  • I presented my research to around twenty students.
  • Honors Independent Research Presentation
  • Learn more about the project here
27 October: WiCyS@RIT – Bash Basics
  • Fifteen minute presentation with three activities involving grep, awk, and find
8 October: RITLUG – Free and Open Source Security: Global Culture, Development, and Economics
28 September: RIT Career Services Advisory Board – Panel

Learn from RIT students’—Ann Byerley, Matt Eggert, and Olivia Gallucci—experiences during COVID, how they handled working remotely and in-person. They are ready to share feedback and provide information on enhancing your brand with other RIT students.  

24 September: RITSEC – Effectiveness of Threat Mitigation in Layers of the Open Systems Interconnection (OSI) Model (Recorded)
9 September: WiCyS International Conference – Effectiveness of Threat Mitigation in Layers of the OSI Model (Recorded)
  • My research was a Fire Talk at the WiCyS international conference in Denver, Colorado.
  • I won a full conference scholarship to present my research.
  • Project information

Official image

3 September: RITSEC – Free and Open Source Security: Global Culture, Development, and Economics (Recorded)
30 July: GenCyber – Panel
  • I was a student panelist on New York City’s GenCyber Student and Professional Panel
22 July: RITSEC – Club Overview and Student Q&A
  • Presented with the RITSEC President and Head of Research
  • Hour long meeting discussing club activities, student life, and Q&A
  • Around fifteen attendees
14 July: RIT GCCIS Club Exploration for Incoming Freshman – RITSEC
  • Presented with the RITSEC President and Head of Research
  • Covered a ten-minute segment on RITSEC
  • Around thirty attendees
5 May: RIT – Effectiveness of Threat Mitigation in Layers of the Open Systems Interconnection Model

14 April: RIT – Summaries and Annotated Bibliographies of Successful Free & Open Source Projects
  • I presented my research to seventeen faculty members.
  • Honors Independent Research Presentation
  • I was able to onboard two faculty contributors after my presentation.
  • After this presentation, I was paid by Open@RIT to continue this project.
  • All of the work I analyzed is located inside this Zotero collection.
  • Project information
7 April: RIT’s Open House for Prospective Computing Security Students – Panel
  • I was one of two freshman student panelists at RIT’s open house for prospective Computing Security students.
  • I covered various topics surrounding RIT, such as student life, academics, RITSEC, WiCyS@RIT, academic opportunities in Free and Open Source Software, and sailing.
24 March: RIT’s Accepted Computing Security Student House – Panel
  • I was one of two freshman student panelists at RIT’s open house for prospective Computing Security students.
  • Topic I covered included student life, academics, RITSEC, RIT’s WiCyS Chapter, RIT’s Free and Open Source Software program, and sailing.
16 March: WiCyS@RIT – Career Fair
  • Covers what the WiCyS career fair is, how it works, and why freshman and sophomores should attend the fair.
  • The original presentation was not recorded. I will be giving a similar presentation next year for RITSEC, and that presentation will be recorded. I will provide a link once the RITSEC presentation is uploaded.

29 January: RITSEC – Hak5 Rubber Ducky Research (Recorded)

2020

11 September: RITSEC – Mandiant Attack Life Cycle (Recorded)
  • Co-presenting with Shannon McHale
  • Covers stages of the attack life cycle

🌸👋🏻 Join 10,000+ followers! Let’s take this to your inbox. You’ll receive occasional emails about whatever’s on my mind—offensive security, open source, boats, reversing, software freedom, you get the idea.


Presentation page - resources section

Resources

CFP Tips from the Diana Initiative

Formatting

Portrait of Olivia Gallucci in garden, used in LNP article.

Written by Olivia Gallucci

Olivia is senior security engineer, certified personal trainer, and freedom software advocate. She writes about offensive security, open source software, and professional development.

Discover more from [ret]2read

An OS Internals Newsletter by Olivia Gallucci. Subscribe now to keep reading and get access to the full archive.

Continue reading