Presentaciones de Black Hat Europe 2016
Ya se encuentran disponibles las presentaciones de otra de las ediciones de Black Hat, la edición europea de 2016 en este caso.
- (Pen)Testing Vehicles with CANToolz
eu-16-Sintsov-Pen-Testing-Vehicles-With-Cantoolz.pdf - 50 Thousand Needles in 5 Million Haystacks: Understanding Old Malware Tricks to Find New Malware Families
eu-16-Valeros-50-Thousand-Needles-In-5-Million-Haystacks-Understanding-Old-Malware-Tricks-To-Find-New-Malware-Families.pdf - AI based Antivirus: Can AlphaAV Win the Battle in which Man Has Failed?
eu-16-Wang-AI-Based-Antivirus-Can-Alphaav-Win-The-Battle-In-Which-Man-Has-Failed.pdf - Another Brick Off the Wall: Deconstructing Web Application Firewalls Using Automata Learning
eu-16-Argyros-Another-Brick-Off-The-Wall-Deconstructing-Web-Application-Firewalls-Using-Automata-Learning.pdf
eu-16-Argyros-Another-Brick-Off-The-Wall-Deconstructing-Web-Application-Firewalls-Using-Automata-Learning-wp.pdf
eu-16-Argyros-Another-Brick-Off-The-Wall-Deconstructing-Web-Application-Firewalls-Using-Automata-Learning-too-lightbulb-framework.zip - ARMageddon: How Your Smartphone CPU Breaks Software-Level Security and Privacy
eu-16-Lipp-ARMageddon-How-Your-Smartphone-CPU-Breaks-Software-Level-Security-And-Privacy.pdf
eu-16-Lipp-ARMageddon-How-Your-Smartphone-CPU-Breaks-Software-Level-Security-And-Privacy-wp.pdf
armageddon - Attacking Windows by Windows
eu-16-Liang-Attacking-Windows-By-Windows.pdf - Automating Incident Response: Sit Back and Relax Bots are Taking Over…
eu-16-Hovor-Automating-Incident-Investigations-Sit-Back-And-Relax-Bots-Are-Taking-Over.pdf - Backslash Powered Scanning: Hunting Unknown Vulnerability Classes
eu-16-Kettle-Backslash-Powered Scanning-Hunting-Unknown-Vulnerability-Classes.pdf
eu-16-Kettle-Backslash-Powered Scanning-Hunting-Unknown-Vulnerability-Classes-wp.pdf
eu-16-Kettle-Backslash-Powered Scanning-Hunting-Unknown-Vulnerability-Classes-backslashPoweredScanner.zip
eu-16-Kettle-Backslash-Powered Scanning-Hunting-Unknown-Vulnerability-Classes-distributeDamage.zip - Breaking BHAD: Abusing Belkin Home Automation Devices
eu-16-Tenaglia-Breaking-Bhad-Abusing-Belkin-Home-Automation-Devices.pdf - Breaking Big Data: Evading Analysis of the Metadata of Your Life
eu-16-Venable-Breaking-Big-Data-Evading-Analysis-Of-The-Metadata-Of-Your-Life.pdf - Bypassing Clang’s SafeStack for Fun and Profit
- Bypassing Secure Boot Using Fault Injection
eu-16-Timmers-Bypassing-Secure-Boot-Using-Fault-Injection.pdf - Chasing Foxes by the Numbers: Patterns of Life and Activity in Hacker Forums
eu-16-Ahlberg-Chasing-Foxes-By-The-Numbers-Patterns-Of-Life-And-Activity-In-Hacker-Forums.pdf - Code Deobfuscation: Intertwining Dynamic Static and Symbolic Approaches
eu-16-David-Code-Deobfuscation-Intertwining-Dynamic-Static-And-Symbolic-Approaches.pdf - CTX: Eliminating BREACH with Context Hiding
eu-16-Karakostas-Ctx-Eliminating-BREACH-With-Context-Hiding.pdf
eu-16-Karakostas-Ctx-Eliminating-BREACH-With-Context-Hiding-wp.pdf - Cyber Judo: Offensive Cyber Defense
eu-16-Beery-Grady-Cyber-Judo-Offensive-Cyber-Defense.pdf - Detach Me Not – DoS Attacks Against 4G Cellular Users Worldwide from your Desk
eu-16-Holtmanns-Detach-Me-Not.pdf - DRAMA: How Your DRAM Becomes a Security Problem
eu-16-Schwarz-How-Your-DRAM-Becomes-A-Security-Problem.pdf
eu-16-Schwarz-How-Your-DRAM-Becomes-A-Security-Problem-wp.pdf
eu-16-Schwarz-How-Your-DRAM-Becomes-A-Security-Problem-tool.zip - Effective File Format Fuzzing – Thoughts Techniques and Results
eu-16-Jurczyk-Effective-File-Format-Fuzzing-Thoughts-Techniques-And-Results.pdf - EGO MARKET: When People’s Greed for Fame Benefits Large-Scale Botnets
eu-16-Paquet-Clouston-Ego-Market_When-Greed-for-Fame-Benefits-Large-Scale-Botnets.pdf
eu-16-Paquet-Clouston-Ego-Market_When-Greed-for-Fame-Benefits-Large-Scale-Botnets-wp.pdf - Flip Feng Shui: Rowhammering the VM’s Isolation
eu-16-Razavi-Flip-Feng-Shui-Rowhammering-The-VMs-Isolation.pdf
eu-16-Razavi-Flip-Feng-Shui-Rowhammering-The-VMs-Isolation-wp.pdf - Ghost in the PLC: Designing an Undetectable Programmable Logic Controller Rootkit
eu-16-Abbasi-Ghost-In-The-PLC-Designing-An-Undetectable-Programmable-Logic-Controller-Rootkit.pdf
eu-16-Abbasi-Ghost-In-The-PLC-Designing-An-Undetectable-Programmable-Logic-Controller-Rootkit-wp.pdf - GPU Security Exposed
eu-16-Taft-GPU-Security-Exposed.pdf - How to Fool an ADC Part II or Hiding Destruction of Turbine with a Little Help of Signal Processing
eu-16-Gonzalez-How-To-Fool-An-ADC-Part-II-Or-Hiding-Destruction-Of-Turbine-With-A-Little-Help-Of-Signal-Processing.pdf - I Know What You Saw Last Minute – The Chrome Browser Case
eu-16-Dubin-I-Know-What-You-Saw-Last-Minute-The-Chrome-Browser-Case.pdf
eu-16-Dubin-I-Know-What-You-Saw-Last-Minute-The-Chrome-Browser-Case-WP.pdf - Inside Web Attacks: The Real Payloads
- Locknote: Conclusions and Key Takeaways from Black Hat Europe 2016
- Mobile Espionage in the Wild: Pegasus and Nation-State Level Attacks
eu-16-Bazaliy-Mobile-Espionage-in-the-Wild-Pegasus-and-Nation-State-Level-Attacks.pdf - Narcos Counterfeiters and Scammers: An Approach to Visualize Illegal Markets
eu-16-Lewman-Narcos-Counterfeiters-And-Scammers-An-Approach-To-Visualize-Illegal-Markets.pdf - Pocket-Sized Badness: Why Ransomware Comes as a Plot Twist in the Cat-Mouse Game
eu-16-Maggi-Pocket-sized Badness-Why-Ransomware Comes-as-a-Plot-Twist-in-the-Cat-Mouse-Game.pdf
heldroid - Randomization Can’t Stop BPF JIT Spray
eu-16-Reshetova-Randomization-Can’t-Stop-BPF-JIT-Spray.pdf
eu-16-Reshetova-Randomization-Can’t-Stop-BPF-JIT-Spray-wp.pdf - Real-World Post-Quantum Cryptography: Introducing the OpenQuantumSafe Software Project
- Rooting EVERY Android: From Extension to Exploitation
eu-16-Shen-Rooting-Every-Android-From-Extension-To-Exploitation.pdf
eu-16-Shen-Rooting-Every-Android-From-Extension-To-Exploitation-wp.pdf
eu-16-Shen-Rooting-Every-Android-From-Extension-To-Exploitation-wp.pdf - Signing Into One Billion Mobile App Accounts Effortlessly with OAuth2.0
eu-16-Yang-Signing-Into-Billion-Mobile-Apps-Effortlessly-With-OAuth20.pdf
eu-16-Yang-Signing-Into-Billion-Mobile-Apps-Effortlessly-With-OAuth20-wp.pdf - Stumping the Mobile Chipset
eu-16-Donenfeld-Stumping-The-Mobile-Chipset.pdf
eu-16-Donenfeld-Stumping-The-Mobile-Chipset-wp.pdf - Talking Behind Your Back: Attacks and Countermeasures of Ultrasonic Cross-Device Tracking
eu-16-Mavroudis-Talking-Behind-Your-Back-Attacks-And-Countermeasures-Of-Ultrasonic-Cross-Device-Tracking.pdf - Towards a Policy-Agnostic Control-Flow Integrity Implementation
eu-16-Sullivan-Towards-A-Policy-Agnostic-Control-Flow-Integrity-Implementation.pdf - Use-After-Use-After-Free: Exploit UAF by Generating Your Own
eu-16-Wen-Use-After-Use-After-Free-Exploit-UAF-By-Generating-Your-Own.pdf
eu-16-Wen-Use-After-Use-After-Free-Exploit-UAF-By-Generating-Your-Own-wp.pdf - When Virtualization Encounter AFL: A Portable Virtual Device Fuzzing Framework with AFL
eu-16-Li-When-Virtualization-Encounters-AFL-A-Portable-Virtual-Device-Fuzzing-Framework-With-AFL.pdf
eu-16-Li-When-Virtualization-Encounters-AFL-A-Portable-Virtual-Device-Fuzzing-Framework-With-AFL-wp.pdf - WiFi-Based IMSI Catcher
eu-16-OHanlon-WiFi-IMSI-Catcher.pdf - Witchcraft Compiler Collection: Towards Self Aware Computer Programs
eu-16-Brossard-Witchcraft-Compiler-Collection-Towards-Self-Aware-Computer-Programs.pdf
eu-16-Brossard-Witchcraft-Compiler-Collection-Towards-Self-Aware-Computer-Programs-wp.pdf
Fuente: CyberHades
Comentarios
Publicar un comentario