USA
Europe
Asia
Summits
Executive Summit 2015
London 2015
Archives
Sponsorships
Press
About
About Us
Community
Review Board
Training Review Board
Contact Us
Code of Conduct
Privacy
Briefings
Speakers
Trainings
Briefings March 26
Briefings March 27
Arsenal March 26
Arsenal March 27
Sponsored Sessions March 26
Sponsored Sessions March 27
Exhibit Now
Event Sponsors
Sponsored Sessions
Arsenal
Trainings
March 24 & 25
Briefings
March 26
Arsenal
March 26
Sponsored Sessions
March 26
Briefings
March 27
Arsenal
March 27
Sponsored Sessions
March 27
Briefings | March 26
07:30
Registration
08:00
Welcome Tea & Coffee
Sponsored By
Sponsored By
08:50
Welcome & Introduction to Black Hat Asia 2015
09:00
Keynote
Information Technology Systems in a Post-Silicon World
Bernard S. Meyerson Ph.D.
Begonia Ballroom
09:00 - 10:00
10:00
Break
10:15
Bar-Mitzva Attack: Breaking SSL with 13-Year Old RC4 Weakness
Itsik Mantin
Begonia 3011
10:15 - 11:15
The Underground Ecosystem of Credit Card Frauds
Abhinav Singh
Begonia Ballroom
10:15 - 11:15
Understanding SCADA's Modbus Protocol
Justin Searle
Cassia 3211
10:15 - 12:45
11:15
Coffee Service
Sponsored By
Sponsored By
11:45
From Zero to Secure in One Minute
Nir Valtman
&
Moshe Ferber
Begonia Ballroom
11:45 - 12:45
Manna from Heaven: Improving the State of Wireless Rogue AP Attacks
Daniel Cuthbert
Begonia 3011
11:45 - 12:45
12:45
Lunch Break
Sponsored By
Sponsored By
14:15
Hopping on the CAN Bus
Eric Evenchick
Cassia 3211
14:15 - 15:15
(In)Security of Mobile Banking
Eric Filiol
&
Paul Irolla
Begonia Ballroom
14:15 - 15:15
Next Level Cheating and Leveling Up Mitigations
Joel St. John
&
Nicolas Guigo
Begonia 3011
14:15 - 15:15
15:15
Break
15:30
Client-Side Protection Against DOM-Based XSS Done Right (tm)
Martin Johns
&
Sebastian Lekies
&
Ben Stock
Begonia 3011
15:30 - 16:30
Decentralized Malware on the Blockchain
Christian Karam
&
Vitaly Kamluk
Begonia Ballroom
15:30 - 16:30
Forging the USB Armory
Andrea Barisani
Cassia 3211
15:30 - 16:30
16:30
Coffee Service
Sponsored By
Sponsored By
17:00
API Deobfuscator: Identifying Runtime-Obfuscated API Calls via Memory Access Analysis
Seokwoo Choi
Begonia 3011
17:00 - 17:30
Resurrecting the READ_LOGS Permission on Samsung Devices
Ryan Johnson
&
Angelos Stavrou
Begonia Ballroom
17:00 - 17:30
We Can Still Crack You! General Unpacking Method for Android Packer (no root)
Yeongung Park
Cassia 3211
17:00 - 17:30
17:30
Business Hall Reception
Sponsored By