Black Hat Home Black Hat Home Black Hat Europe Briefings Black Hat Europe Briefings Black Hat Europe Training Black Hat Europe Training Black Hat Europe Schedule Black Hat Europe Schedule Black Hat Europe Sponsors Black Hat Europe Sponsors Black Hat Europe Arsenal Black Hat Europe Arsenal Black Hat Europe Venue Black Hat Europe Venue


Briefings | Thursday March 14

0730
Registration

0800
Sponsored By:
 

0800
Sponsor Hall - Ends at 1930

0920
Welcome & Introduction to Black Hat Europe 2013
in Grand Ballroom

0930
Keynote
in Grand Ballroom

1030
Break
Track
ROOM
Track 1
Track 1
Track 2
Track 2
Track 3
Track 3
Track 4
Track 4
Track 5
Track 5
1045
The M2M Risk Assessment Guide, A Cyber Fast Track Project
Don A. Bailey
The Deputies are Still Confused
Rich Lundeen
Practical Attacks Against MDM Solutions
Daniel Brodie + Michael Shaulov
Powershell For Penetration Testers
Nikhil Mittal
Vehicle Networks
Robert Leale

1145
Coffee Service
Track
ROOM
Track 1
Track 1
Track 2
Track 2
Track 3
Track 3
Track 4
Track 4
Track 5
Track 5
1215
Hacking Appliances: Ironic Exploitation of Security Products
Ben Williams
Practical Exploitation Using A Malicious Service Set Identifier (SSID)
Deral Heiland
Let's Play - Applanting
Ajit Hatti
Powershell For Penetration Testers
Nikhil Mittal
Vehicle Networks
Robert Leale

1315
Sponsored By:
 
Track
ROOM
Track 1
Track 1
Track 2
Track 2
Track 3
Track 3
Track 4
Track 4
Track 5
Track 5
1430
Building a Defensive Framework for Medical Device Security
Jay Radcliffe
XML out-of-band data retrieval
Alexey Osipov + Timur Yunusov
Hardening Windows 8 Apps for the Windows Store
Bill Sempf
Powershell For Penetration Testers
Nikhil Mittal
Vehicle Networks
Robert Leale

1530
Break
Track
ROOM
Track 1
Track 1
Track 2
Track 2
Track 3
Track 3
Track 4
Track 4
Track 5
Track 5
1545
Huawei - From China With Love
Nikita Tarakanov + Oleg Kupreev
A Perfect CRIME? Only TIME Will Tell
Tal Be'ery + Amichai Shulman
Off Grid Communications With Android- Meshing The Mobile World
Josh Thomas + Jeff Robble
Application Development Secure Coding Workshop
Jim Manico
Vehicle Networks
Robert Leale

1645
Sponsored By:
 
Track
ROOM
Track 1
Track 1
Track 2
Track 2
Track 3
Track 3
Track 4
Track 4
Track 5
Track 5
1700
To Dock or Not to Dock, That is The Question: Using Laptop Docking Stations As Hardware-based Attack Platforms
Andy Davis
Invisibility Purge – Unmasking the Dormant Events of Invisible Web Controls – Advanced Hacking Methods for Asp.Net, Mono and RIA
Shay Chen
Floating Car Data from Smartphones: What Google and Waze Know About You and How Hackers Can Control Traffic
Tobias Jeske
Application Development Secure Coding Workshop
Jim Manico
Vehicle Networks
Robert Leale

1800
Sponsored By: