Next-Generation of Exploit Kit Detection by Building Simulated Obfuscators
|
Tongbo Luo
,
Xing Jin
,
Palo Alto Networks
|
Bad for Enterprise: Attacking BYOD Enterprise Mobile Security Solutions
|
Vincent Tan
,
Vantage Point Security
|
Ouroboros: Tearing Xen Hypervisor with the Snake
|
Shangcong Luan
,
Alibaba Group Holding Limited
|
Capturing 0day Exploits with PERFectly Placed Hardware Traps
|
Cody Pierce
,
Matt Spisak
,
Kenneth Fitch
,
Endgame
|
The Risk from Power Lines: How to Sniff the G3 and Prime Data and Detect the Interfere Attack
|
Lei Ji
,
Yunding Jian
,
Qihoo 360 Technology Co., Ltd
|
What's the DFIRence for ICS?
|
Chris Sistrunk
,
Josh Triplett
,
FireEye, Inc.
|
Secure Penetration Testing Operations: Demonstrated Weaknesses in Learning Material and Tools
|
Wesley McGrew
,
HORNE Cyber
|
TCP Injection Attacks in the Wild - A Large Scale Study
|
Gabi Nakibly
,
Rafael -- Advanced Defense Systems
|
Unleash the Infection Monkey: A Modern Alternative to Pen-Tests
|
Ofri Ziv
,
Guardicore
|
Horse Pill: A New Type of Linux Rootkit
|
Michael Leibowitz
,
Intel Corporation
|
Windows 10 Segment Heap Internals
|
Mark Vincent Yason
,
IBM
|
Beyond the MCSE: Active Directory for the Security Professional
|
Sean Metcalf
,
Trimarc
|
Drone Attacks on Industrial Wireless: A New Front in Cyber Security
|
Jeff Melrose
,
Yokogawa
|
The Remote Malicious Butler Did It!
|
Tal Be'ery
,
Chaim Hoch
,
Microsoft Corporation
|
Breaking FIDO: Are Exploits in There?
|
Jerrod Chong
,
Yubico
|
Side-Channel Attacks on Everyday Applications
|
Taylor Hornby
,
Zcash
|
Can You Trust Me Now? An Exploration into the Mobile Threat Landscape
|
Josh Thomas
,
Shawn Moyer
,
Atredis Partners
|
Breaking Kernel Address Space Layout Randomization (KASLR) with Intel TSX
|
Yeongjin Jang
,
Sangho Lee
,
Taesoo Kim
,
Georgia Institute of Technology
|
When Governments Attack: State Sponsored Malware Attacks Against Activists Lawyers and Journalists
|
Cooper Quintin
,
Eva Galperin
,
Electronic Frontier Foundation
|
Hackproofing Oracle eBusiness Suite
|
David Litchfield
,
Google Inc.
|
Xenpwn: Breaking Paravirtualized Devices
|
Felix Wilhelm
,
ERNW GmbH
|
Memory Forensics Using Virtual Machine Introspection for Cloud Computing
|
Tobias Zillner
,
Zillner IT-Security
|
Samsung Pay: Tokenized Numbers Flaws and Issues
|
Salvador Mendoza
,
Modesto Junior College
|
Augmenting Static Analysis Using Pintool: Ablation
|
Paul Mehta
,
Cylance Inc.
|
badWPAD
|
Maxim Goncharov
,
Trend Micro, Inc.
|
Cyber War in Perspective: Analysis from the Crisis in Ukraine
|
Kenneth Geers
,
NATO Cyber Centre
|
1000 Ways to Die in Mobile OAuth
|
Yuan Tian
,
Eric Chen
,
Shuo Chen
,
Yutong Pei
,
Robert Kotcher
,
Patrick Tague
,
Carnegie Mellon University
,
Gridspace
,
Microsoft Research
,
Uber
,
Expii
|
An Inconvenient Trust: User Attitudes Toward Security and Usability Tradeoffs for Key-Directory Encryption Systems
|
Patrick Gage Kelley
,
University of New Mexico
|
Applied Machine Learning for Data Exfil and Other Fun Topics
|
Matt Wolff
,
Brian Wallace
,
Xuan Zhao
,
Cylance
|
I Came to Drop Bombs: Auditing the Compression Algorithm Weapon Cache
|
Cara Marie
,
NCC Group
|
When the Cops Come A-Knocking: Handling Technical Assistance Demands from Law Enforcement
|
Jennifer Granick
,
Riana Pfefferkorn
,
Stanford Center for Internet and Society
|
Cunning with CNG: Soliciting Secrets from Schannel
|
Jake Kambic
|
Adaptive Kernel Live Patching: An Open Collaborative Effort to Ameliorate Android N-Day Root Exploits
|
Yulong Zhang
,
Tao Wei
,
Baidu Security Lab
|
Using Undocumented CPU Behavior to See into Kernel Mode and Break KASLR in the Process
|
Anders Fogh
,
Daniel Gruss
,
Protect Software GmbH
,
Graz University Of Technology
|
Crippling HTTPS with Unholy PAC
|
Itzik Kotler
,
Amit Klein
,
SafeBreach
|
GATTacking Bluetooth Smart Devices - Introducing a New BLE Proxy Tool
|
Slawomir Jasek
,
SecuRing
|
Analysis of the Attack Surface of Windows 10 Virtualization-Based Security
|
Rafal Wojtczuk
,
Bromium
|
Subverting Apple Graphics: Practical Approaches to Remotely Gaining Root
|
Liang Chen
,
Qidan He
,
Marco Grassi
,
Yubin Fu
,
Tencent Keen Security Lab
|
AVLeak: Fingerprinting Antivirus Emulators for Advanced Malware Evasion
|
Alexei Bulazel
,
Rensselaer Polytechnic Institute
|
CANSPY: A Platform for Auditing CAN Devices
|
Jonathan-Christofer Demay
,
Arnaud Lebrun
,
AIRBUS Defence and Space CyberSecurity
|
Advanced CAN Injection Techniques for Vehicle Networks
|
Charlie Miller
,
Chris Valasek
,
Uber ATC
|
OSS Security Maturity: Time to Put On Your Big Boy Pants!
|
Jake Kouns
,
Christine Gadsby
,
Risk Based Security
,
BlackBerry
|
Does Dropping USB Drives in Parking Lots and Other Places Really Work?
|
Elie Bursztein
,
Google Inc.
|
Access Keys Will Kill You Before You Kill the Password
|
Loic Simon
,
NCC Group
|
Brute-Forcing Lockdown Harddrive PIN Codes
|
Colin O'Flynn
|
SGX Secure Enclaves in Practice: Security and Crypto Review
|
Jean-Philippe Aumasson
,
Luis Merino
,
Kudelski Security
|
HTTP/2 & QUIC - Teaching Good Protocols To Do Bad Things
|
Catherine (Kate) Pearce
,
Carl Vincent
,
Cisco Systems
|
Keystone Engine: Next Generation Assembler Framework
|
Nguyen Anh Quynh
|
A Retrospective on the Use of Export Cryptography
|
David Adrian
,
University of Michigan
|
Understanding HL7 2.x Standards Pen Testing and Defending HL7 2.x Messages
|
Anirudh Duggal
,
Royal Philips - Healthcare
|
Behind the Scenes of iOS Security
|
Ivan Krstic
,
Apple
|
HTTP Cookie Hijacking in the Wild: Security and Privacy Implications
|
Suphannee Sivakorn
,
Jason Polakis
,
Columbia University
|
The Tao of Hardware the Te of Implants
|
Joe FitzPatrick
,
SecuringHardware.com
|
Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS
|
Sean Devlin
,
Hanno Böck
,
Aaron Zauner
,
Philipp Jovanovic
,
SBA-Research
,
Swiss Federal Institute of Technology Lausanne (EPFL)
|
Pangu 9 Internals
|
Tielei Wang
,
Hao Xu
,
Xiaobo Chen
,
PanguTeam
|
Weaponizing Data Science for Social Engineering: Automated E2E Spear Phishing on Twitter
|
John Seymour
,
Philip Tully
,
ZeroFOX
|
The Art of Reverse Engineering Flash Exploits
|
Jeong Wook Oh
,
Microsoft Corporation
|
An Insider's Guide to Cyber-Insurance and Security Guarantees
|
Jeremiah Grossman
,
SentinelOne
|
Dangerous Hare: Hanging Attribute References Hazards Due to Vendor Customization
|
Nan Zhang
,
System Security Lab, Indiana University Bloomington
|
Breaking Hardware-Enforced Security with Hypervisors
|
Joseph Sharkey
,
Siege Technologies
|
Breaking Payment Points of Interaction (POI)
|
Nir Valtman
,
Patrick Watson
,
NCR Corporation
|
Investigating DDOS - Architecture Actors and Attribution
|
Elliott Peterson
,
Andre Correa
,
Federal Bureau of Investigation
,
Malware Patrol - malwarepatrol.net
|
Security Through Design - Making Security Better by Designing for People
|
Jelle Niemantsverdriet
,
Deloitte
|
Web Application Firewalls: Analysis of Detection Logic
|
Vladimir Ivanov
,
Positive Technologies
|
Hardening AWS Environments and Automating Incident Response for AWS Compromises
|
Andrew Krug
,
Alex McCormack
|
Iran's Soft-War for Internet Dominance
|
Claudio Guarnieri
,
Collin Anderson
|
Pay No Attention to That Hacker Behind the Curtain: A Look Inside the Black Hat Network
|
Neil Wyler
,
Bart Stump
,
RSA
,
Optiv Security
|
The Hidden Architecture of our Time: Why This Internet Worked How We Could Lose It and the Role Hackers Play
|
Dan Kaminsky
,
White Ops
|
A Lightbulb Worm?
|
Colin O'Flynn
|
Captain Hook: Pirating AVs to Bypass Exploit Mitigations
|
Udi Yavo
,
Tomer Bitton
,
enSilo Inc
|
Language Properties of Phone Scammers: Cyberdefense at the Level of the Human
|
Judith Tabron
,
Hofstra University
|
Welcome & Introduction to Black Hat USA 2016
|
Jeff Moss
,
U.S. Department of Homeland Security Advisory Council
|
Timing Attacks Have Never Been So Practical: Advanced Cross-Site Search Attacks
|
Nethanel Gelernter
,
Cyberpion
|
Blunting the Phisher's Spear: A Risk-Based Approach for Defining User Training and Awarding Administrative Privileges
|
Arun Vishwanath
,
University at Buffalo
|
Towards a Holistic Approach in Building Intelligence to Fight Crimeware
|
Dhia Mahjoub
,
Mykhailo Sakaly
,
Thomas Mathew
,
OpenDNS
,
Intel 471
|
Discovering and Exploiting Novel Security Vulnerabilities in Apple ZeroConf
|
Luyi Xing
,
Xiaolong Bai
,
System Security Lab, Indiana University Bloomington
,
TNList, Tsinghua University, Beijing
|
Using EMET to Disable EMET
|
Abdulellah Alsaheel
,
Raghav Pande
,
FireEye, Inc.
|
Recover a RSA Private Key from a TLS Session with Perfect Forward Secrecy
|
Marco Ortisi
,
ENCS (European Network for CyberSecurity)
|
Hacking Next-Gen ATMs: From Capture to Cashout
|
Weston Hecker
,
Rapid7
|
Watching Commodity Malware Get Sold to a Targeted Actor
|
Israel Barak
,
Cybereason
|
Windows 10 Mitigation Improvements
|
Matt Miller
,
David Weston
,
Microsoft Corporation
|
The Art of Defense - How Vulnerabilities Help Shape Security Features and Mitigations in Android
|
Nick Kralevich
,
Google Inc.
|
Account Jumping Post Infection Persistency & Lateral Movement in AWS
|
Dan Amiga
,
Dor Knafo
,
Fireglass
|
PINdemonium: A DBI-Based Generic Unpacker for Windows Executable
|
Sebastiano Mariani
,
Lorenzo Fontana
,
Polimi
|
Building a Product Security Incident Response Team: Learnings from the Hivemind
|
Kymberlee Price
,
Bugcrowd
|
$hell on Earth: From Browser to System Compromise
|
Matt Molinyawe
,
Jasiel Spelman
,
Abdul-Aziz Hariri
,
Joshua Smith
,
Trend Micro's Zero Day Initiative
|
Building Trust & Enabling Innovation for Voice Enabled IoT
|
Lynn Terwoerds
,
Executive Women's Forum
|
Pwning Your Java Messaging with Deserialization Vulnerabilities
|
Matthias Kaiser
,
Code White
|
Over the Edge: Silently Owning Windows 10's Secure Browser
|
Erik Bosman
,
Kaveh Razavi
,
Herbert Bos
,
Cristiano Giuffrida
,
Vrije Universiteit Amsterdam
|
The Year in Flash
|
Natalie Silvanovich
,
Google Inc.
|
Using an Expanded Cyber Kill Chain Model to Increase Attack Resiliency
|
Sean Malone
,
FusionX
|
Dark Side of the DNS Force
|
Erik Wu
,
Acalvio
|
HEIST: HTTP Encrypted Information can be Stolen Through TCP-Windows
|
Tom Van Goethem
,
Mathy Vanhoef
,
KU Leuven
|
BadTunnel: How Do I Get Big Brother Power?
|
Yang Yu
,
Tencent, Inc.
|
A Journey from JNDI/LDAP Manipulation to Remote Code Execution Dream Land
|
Alvaro Munoz
,
Oleksandr Mirosh
,
Hewlett Packard Enterprise
|
Demystifying the Secure Enclave Processor
|
Tarjei Mandt
,
Mathew Solnik
,
David Wang
,
Azimuth Security
,
OffCell Research
|
The Linux Kernel Hidden Inside Windows 10
|
Alex Ionescu
,
CrowdStrike, Inc.
|
AirBnBeware: Short Term Rentals Long Term Pwnage
|
Jeremy Galloway
,
Atlassian
|
Dungeons Dragons and Security
|
Tiphaine Romand Latapie
,
Airbus Group Innovations
|
Defense at Hyperscale: Technologies and Policies for a Defensible Cyberspace
|
Jason Healey
,
Columbia University SIPA
|
VOIP WARS: The Phreakers Awaken
|
Fatih Ozavci
,
Context Information Security Ltd.
|
PLC-Blaster: A Worm Living Solely in the PLC
|
Ralf Spenneberg
,
Maik Brüggemann
,
Hendrik Schwartke
,
OpenSource Security Ralf Spenneberg
|
Into The Core - In-Depth Exploration of Windows 10 IoT Core
|
Paul Sabanal
,
IBM Security X-Force
|
DPTrace: Dual Purpose Trace for Exploitability Analysis of Program Crashes
|
Rodrigo Rubira Branco
,
Rohit Mothe
,
Intel Corporation
|
An AI Approach to Malware Similarity Analysis: Mapping the Malware Genome With a Deep Neural Network
|
Konstantin Berlin
,
Invincea Labs, LLC
|
O-checker: Detection of Malicious Documents Through Deviation from File Format Specifications
|
Yuhei Otsubo
,
National Police Agency, Japan
|
Viral Video - Exploiting SSRF in Video Converters
|
Nikolay Ermishkin
,
Maxim Andreev
,
Mail.ru Group
|
AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It
|
Nikhil Mittal
|
Certificate Bypass: Hiding and Executing Malware from a Digitally Signed Executable
|
Tom Nipravsky
,
Deep Instinct
|
Measuring Adversary Costs to Exploit Commercial Software: The Government-Bootstrapped Non-Profit C.I.T.L.
|
Mudge
,
Sarah Zatko
,
CITL
|
Attacking SDN Infrastructure: Are We Ready for the Next-Gen Networking?
|
Changhoon Yoon
,
Seungsoo Lee
,
KAIST
|
Call Me: Gathering Threat Intelligence on Telephony Scams to Detect Fraud
|
Aude Marzuoli
,
Pindrop
|
Abusing Bleeding Edge Web Standards for AppSec Glory
|
Bryant Zadegan
,
Ryan Lester
,
The Advisory Board Company
,
Cyph
|
Exploiting Curiosity and Context: How to Make People Click on a Dangerous Link Despite Their Security Awareness
|
Zinaida Benenson
,
University of Erlangen-Nuremberg
|
Intra-Process Memory Protection for Applications on ARM and x86: Leveraging the ELF ABI
|
Sergey Bratus
,
Maxwell Koo
,
Julian Bangert
,
Dartmouth College
,
Narf Industries
,
MIT
|
The Beast Within - Evading Dynamic Malware Analysis Using Microsoft COM
|
Ralf Hund
,
VMRay
|
Crumbling the Supercookie and Other Ways the FCC Protects Your Internet Traffic
|
Travis LeBlanc
,
Jonathan Mayer
,
Federal Communications Commission
|
Design Approaches for Security Automation
|
Peleus Uhley
,
Adobe Systems, Inc.
|
GreatFET: Making GoodFET Great Again
|
Michael Ossmann
,
Great Scott Gadgets
|