- Jun 24, 2016
- 636
A Selection of some of the Briefings taking place on Wednesday August 3rd at Black Hat USA 2016:
(Visit the Link at the top of the page for more information)
The Following take place between 09.00 and 14:40
(Visit the Link at the top of the page for more information)
The Following take place between 09.00 and 14:40
- THE HIDDEN ARCHITECTURE OF OUR TIME: WHY THIS INTERNET WORKED, HOW WE COULD LOSE IT, AND THE ROLE HACKERS PLAY Dan Kaminsky
- A RETROSPECTIVE ON THE USE OF EXPORT CRYPTOGRAPHY David Adrian
- ABUSING BLEEDING EDGE WEB STANDARDS FOR APPSEC GLORY Bryant Zadegan & Ryan Lester
- AUGMENTING STATIC ANALYSIS USING PINTOOL: ABLATION Paul Mehta
- BEYOND THE MCSE: ACTIVE DIRECTORY FOR THE SECURITY PROFESSIONAL Sean Metcalf
- BREAKING PAYMENT POINTS OF INTERACTION (POI) Nir Valtman & Patrick Watson
- CAN YOU TRUST ME NOW? AN EXPLORATION INTO THE MOBILE THREAT LANDSCAPE Josh Thomas
- CAPTURING 0DAY EXPLOITS WITH PERFECTLY PLACED HARDWARE TRAPS Cody Pierce & Matt Spisak & Kenneth Fitch
- HTTP/2 & QUIC - TEACHING GOOD PROTOCOLS TO DO BAD THINGS Catherine (Kate) Pearce & Carl Vincent
- THE LINUX KERNEL HIDDEN INSIDE WINDOWS 10 Alex Ionescu
- $HELL ON EARTH: FROM BROWSER TO SYSTEM COMPROMISE Matt Molinyawe & Jasiel Spelman & Abdul-Aziz Hariri & Joshua Smith
- A JOURNEY FROM JNDI/LDAP MANIPULATION TO REMOTE CODE EXECUTION DREAM LAND Alvaro Munoz & Oleksandr Mirosh
- APPLIED MACHINE LEARNING FOR DATA EXFIL AND OTHER FUN TOPICS Matt Wolff & Brian Wallace & Xuan Zhao
- EXPLOITING CURIOSITY AND CONTEXT: HOW TO MAKE PEOPLE CLICK ON A DANGEROUS LINK DESPITE THEIR SECURITY AWARENESS Zinaida Benenson
- HACKPROOFING ORACLE EBUSINESS SUITE David Litchfield
- MEASURING ADVERSARY COSTS TO EXPLOIT COMMERCIAL SOFTWARE: THE GOVERNMENT-BOOTSTRAPPED NON-PROFIT C.I.T.L. Mudge . & Sarah Zatko
- MEMORY FORENSICS USING VIRTUAL MACHINE INTROSPECTION FOR CLOUD COMPUTING Tobias Zillner
- NONCE-DISRESPECTING ADVERSARIES: PRACTICAL FORGERY ATTACKS ON GCM IN TLS Sean Devlin & Hanno Böck & Aaron Zauner & Philipp Jovanovic
- SUBVERTING APPLE GRAPHICS: PRACTICAL APPROACHES TO REMOTELY GAINING ROOT Liang Chen & Qidan He & Marco Grassi & Yubin Fu
- ADAPTIVE KERNEL LIVE PATCHING: AN OPEN COLLABORATIVE EFFORT TO AMELIORATE ANDROID N-DAY ROOT EXPLOITS Yulong Zhang & Tao Wei
- CANSPY: A PLATFORM FOR AUDITING CAN DEVICES Jonathan-Christofer Demay & Arnaud Lebrun
- CERTIFICATE BYPASS: HIDING AND EXECUTING MALWARE FROM A DIGITALLY SIGNED EXECUTABLE Tom Nipravsky
- DRONE ATTACKS ON INDUSTRIAL WIRELESS: A NEW FRONT IN CYBER SECURITY Jeff Melrose
- GATTACKING BLUETOOTH SMART DEVICES - INTRODUCING A NEW BLE PROXY TOOL Slawomir Jasek
- HEIST: HTTP ENCRYPTED INFORMATION CAN BE STOLEN THROUGH TCP-WINDOWS Tom Van Goethem & Mathy Vanhoef
- SECURE PENETRATION TESTING OPERATIONS: DEMONSTRATED WEAKNESSES IN LEARNING MATERIAL AND TOOLS Wesley McGrew
- TOWARDS A HOLISTIC APPROACH IN BUILDING INTELLIGENCE TO FIGHT CRIMEWARE Dhia Mahjoub & Mykhailo Sakaly & Thomas Mathew
- XENPWN: BREAKING PARAVIRTUALIZED DEVICES Felix Wilhelm