USA
Europe
Asia
Trainings
Archives
Sponsorships
Press
About
About Us
Community
Review Board
Training Review Board
Contact Us
Code of Conduct
Privacy
Upcoming Events
Media Registration
Briefings Abstracts
Arsenal Lineup
Arsenal Overview
Exhibit Now
Event Sponsors
Sponsor Portal
Business Hall Presentations
Trainings
March 28 & 29
Briefings
March 30
Arsenal
March 30
Business Hall Presentations
March 30
Briefings
March 31
Arsenal
March 31
Business Hall Presentations
March 31
Briefings | March 31
08:00
Registration
Lotus Foyer
08:00
Welcome Tea & Coffee
Roselle-Simpor Main Foyer
BROUGHT TO YOU BY BLACK HAT ASIA DIAMOND SPONSORS - Qualys & Tenable
09:00
The Seven Axioms of Security
Saumil Shah
Roselle Junior Ballroom 4610
09:00 - 10:00
10:00
Break
10:15
Beyond the Blacklists: Detecting Malicious URL Through Machine Learning
Hao Dong
&
Chenghuai Lu
&
David Yu
&
Jin Shang
Roselle Junior Ballroom 4610
10:15 - 11:15
Hack Microsoft Using Microsoft Signed Binaries
Pierre-Alexandre Braeken
Simpor Junior Ballroom 4810B
10:15 - 11:15
Never Let Your Guard Down: Finding Unguarded Gates to Bypass Control Flow Guard with Big Data
Ke Sun
&
Ya Ou
Simpor Junior Ballroom 4812
10:15 - 11:15
The UEFI Firmware Rootkits: Myths and Reality
Alex Matrosov
&
Eugene Rodionov
Roselle-Simpor Ballroom 4801A
10:15 - 11:15
11:15
Coffee Service
Roselle-Simpor Ballroom
11:45
24 Techniques to Gather Threat Intel and Track Actors
Sun Huang
&
Wayne Huang
Roselle Junior Ballroom 4610
11:45 - 12:45
3G/4G Intranet Scanning and its Application on the WormHole Vulnerability
Guangdong Bai
&
Zhang Qing
Roselle-Simpor Ballroom 4801A
11:45 - 12:45
Myth and Truth About Hypervisor-Based Kernel Protector: The Reason Why You Need Shadow-Box
Seunghun Han
&
Junghwan Kang
Simpor Junior Ballroom 4810B
11:45 - 12:45
The Power of Data-Oriented Attacks: Bypassing Memory Mitigation Using Data-Only Exploitation Techniques
Bing Sun
&
Chong Xu
&
Stanley Zhu
Simpor Junior Ballroom 4812
11:45 - 12:45
12:45
Lunch Break
Roselle-Simpor Ballroom
BROUGHT TO YOU BY BLACK HAT ASIA PLATINUM SPONSORS - CrowdStrike, Cylance, & SentinelOne
14:15
Cache Side Channel Attack: Exploitability and Countermeasures
Xiaofei Guo
&
Gorka Irazoqui
Simpor Junior Ballroom 4812
14:15 - 15:15
Go Get My/Vulnerabilities: An In-Depth Analysis of Go Language Runtime and the New Class of Vulnerabilities It Introduces
Roberto Clapis
Simpor Junior Ballroom 4810B
14:15 - 15:15
Mobile-Telephony Threats in Asia
Marco Balduzzi
&
Payas Gupta
&
Lion Gu
Roselle Junior Ballroom 4610
14:15 - 15:15
What Malware Authors Don't Want You to Know - Evasive Hollow Process Injection
Monnappa K A
Roselle-Simpor Ballroom 4801A
14:15 - 15:15
15:15
Arsenal Reception
BUSINESS HALL, ROSELLE-SIMPOR BALLROOM
15:30
All Your Emails Belong to Us: Exploiting Vulnerable Email Clients via Domain Name Collision
Ilya Nesterov
&
Maxim Goncharov
Roselle Junior Ballroom 4610
15:30 - 16:00
Betting Against the House: Security and Stability When the Odds are Against You
Neil Wyler
&
Bart Stump
Simpor Junior Ballroom 4810B
15:30 - 16:00
MASHaBLE: Mobile Applications of Secret Handshakes Over Bluetooth LE
Yan Michalevsky
Simpor Junior Ballroom 4812
15:30 - 16:00
16:15
Locknote: Conclusions and Key Takeaways from Black Hat Asia 2017
Jeff Moss
&
Saumil Shah
&
Halvar Flake
&
Christian Karam
Roselle Junior Ballroom 4610
16:15 - 17:00