Ya está disponible el material de la recién acabada BlackHat 2012 Europa. Parece que faltan algunas charlas. Si las ponen actualizaremos esta entrada.
- Axelle Apvrille – Guillaume LovetAn Attacker’s Day into Virology: Human vs Computer:
- Antonios Atlasis – Attacking IPv6 Implementation Using Fragmentation:
- Michael BakerFinding Needles in Haystacks (The Size of Countries):
- Andrey Belenko – Dmitry Sklyarov”Secure Password Managers” and “Military-Grade Encryption” on Smartphones: Oh Really?:
- Andy DavisHDMI – Hacking Displays Made Interesting:
- Stephen de Vries – Beyond Scanning: Automating Web Application Security Tests:
- Tyrone Erasmus – The Heavy Metal That Poisoned the Droid:
- Takahiro Haruyama – Hiroshi SuzukiOne-byte Modification for Breaking Memory Forensic Analysis:
- Marcia Hofmann – Seth SchoenDefending Privacy at the U.S. Border: A Guide for Travelers Carrying Digital Devices:
- Jeff Jarmoc – SSL/TLS Interception Proxies and Transitive Trust:
- Ling Chuan Lee – Chan Lee YeeGDI Font Fuzzing in Windows Kernel For Fun:
- Steve Lord – Drop It Like It’s Hotspot: Hacking Mifi Routers For Nefarious Purposes
- Rafal Los – Shane MacDougall Offensive Threat Modeling for Attackers: Turning Threat Modeling on its Head
- Matias Madou – Secure in 2010? Broken in 2011!
- Mariano Nunez Di Croce – Cyber-Attacks & SAP systems: Is Our Business-Critical Infrastructure Exposed?
- Phil Polstra – Preventing “Oh Shit!” Moments for 20 Euros or Less
- Jerome Radcliffe – Issues with Embedded Device Disclosures: Helping the Vendors and Recognizing the End-Users
- Enno Rey – Daniel Mende All Your Calls Are Still Belong to Us: How We Compromised the Cisco VoIP Crypto Ecosystem
- Simon Roses Femerling – Smartphone’s Apps Are Not That Smart: Insecure Development Practices
- Paul Royal – Entrapment: Tricking Malware with Transparent, Scalable Malware Analysis
- Rahul Sasi – IVR Security- Internal Network Attack via Phone Lines
- Justin Searle – Dissecting Smart Meters
- Slides
- Shreeraj Shah – HTML5 Top 10 Threats: Stealth Attacks and Silent Exploits
- Sumit Siddharth – Tom ForbesHacking XPATH 2.0
- Alexey Sintsov – Lotus Domino: Penetration Through the Controller
- Didier Stevens – Malicious PDF Analysis
- Ben Williams – They Ought to Know Better: Exploiting Security Gateways via Their Web Interfaces
- Chris Wysopal – Data Mining a Mountain of Zero Day Vulnerabilities
- Justin Searle – Workshop: SamuraiWTF
Visto en cyberhades.com
No hay comentarios:
Publicar un comentario