RSS feed logo header graphic

Speakers

Black Hat USA 2008 Archives

Black Hat USA 2008 Presentations are listed alphabetically by speaker.

Keynote: Complexity in Computer Security: a Risky Business

Ian O. Angell, Professor of Information Systems. London School of Economics

video audio presentation ppt

Winning the Race to Bare Metal – UEFI Hypervisors

Don Bailey, Martin Mocko

Track: Turbo Talk

video audio presentation ppt

Keynote: Natural Security

Rod Beckström, Director of the National Cyber Security Center

video audio presentation ppt

RE:Trace - Applied Reverse Engineering on OS X

Tiller Beauchamp, David Weston

Track: Reverse Engineering

video audio presentation ppt

Predictable RNG in the Vulnerable Debian OpenSSL package, the What and the How

Luciano Bello, Maximiliano Bertacchini

Track: Network

video audio presentation ppt

When Lawyers Attack: Dealing With the New Rules of Electronic Discovery

John Benson

Track: Deep Knowledge

video video audio presentation ppt

No More 0-Days (or Code-Based Intrusion Detection by Korset)

Ohad Ben-Cohen

Track: 0-Day Defense

video audio presentation ppt

Free-Space Quantum Key Distribution at GHz Transmission Rates

Joshua Bienfang

Track: Turbo Talks

video audio presentation ppt

Active 802.11 Fingerpinting: a "Secret Handshake" to Know Your APs

Sergey Bratus

Track: OTA

video audio presentation ppt

SmartCard APDU Analysis

Ivan Buetler

Track: Hardware

video audio presentation ppt

Insane Detection of Insane Rootkits: Chipset Based Approach to Detect Virtualization Malware

Yuriy Bulygin

Track: Root Kit Arms Race

video audio presentation ppt

FLEX, AMF 3 and BlazeDS: An Assessment

Jacob Carlson, Kevin Stadmeyer

Track: App Sec 1.0 / 2.0

video audio presentation ppt

Cisco IOS Shellcodes/Backdoors

Gyan Chawdhary, Varun Uppal

Track:

video audio presentation ppt

SQL Injection Worms for Fun and Profit

Justin Clarke

Track: Turbo Talks

video audio presentation ppt

Commission on Cyber Security for the 44th Presidency

Panel Discussion


video audio presentation ppt

Visual Forensic Analysis and Reverse Engineering of Binary Data

Greg Conti, Erik Dean

Track: Forensics & Anti Forensics

video audio presentation ppt Extras/Tools

iRK - Crafting OS X Kernel Rootkits

Jesse D'Aguanno

Track: Rootkits Arms Race

video audio presentation ppt Extras/Tools

Methods for Understanding Targeted Attacks with Office Documents

Bruce Dang

Track: App Sec 1.0 / 2.0

video audio presentation ppt

AppSec A-Z: Reverse Engineering, Source Code Auditing, Fuzzing, and Exploitation

Jared DeMott

Track: App Sec 1.0 / 2.0

video video audio - part 1 audio - part 2 presentation ppt

Bad Sushi: Beating Phishers at Their Own Game

Nitesh Dhanjani, Senior Manager

Billy Rios, Microsoft

Track: Bots and Malware

video audio presentation ppt

Next Generation Collaborative Reversing with Ida Pro and CollabREate

Chris Eagle, Tim Vidas

Track: App Sec 1.0/ 2.0

video audio presentation ppt

A New Breed of Rootkit: The System Management Mode (SMM) Rootkit

Shawn Embleton, Sherri Sparks

Track: Root Kit Arms Race

video audio presentation ppt

Encoded, Layered, and Trancoded Syntax Attacks: Threading the Needle past Web Application Security Controls

Arian Evans

Track: App Sec 1.0 / 2.0

video audio presentation ppt

Hacker Court 2008: Hack MyFace

Carole Fennelly, Paul Ohm, Richard Salgado, Kurt Opsahl, Jennifer Granick, Richard Thieme, Peiter Zatko, Brian Martin, Simple Nomad, Jonathan Klein, Caitlin Klein, Ryan Bulat

Track: Reception, Day 1

video audio presentation ppt

Passive and Active Leakage of Secret Data from Non Networked Computer

Eric Filiol

Track:

video video audio audio presentation ppt

Threats to the 2008 Presidential Election (and more)

Oliver Friedrichs

Track: App Sec 1.0 / 2.0

video audio presentation ppt

Taking the Hype Out of Hypervisors

Tal Garfinkel

Track: Virtualization

video audio presentation ppt

Side-channel Timing Attacks on MSP430 Microcontroller Firmware

Travis Goodspeed

Track: Hardware

video audio presentation ppt

Get Rich or Die Trying - "Making Money on The Web, The Black Hat Way"

Jeremiah Grossman, Trey Ford

Track: Web 2.0

video audio presentation ppt

Hacking and Injecting Federal Trojans.

Lukas Grunwald

Track: Forensics & Anti Forensics

video video audio audio presentation ppt

Decompilers and Beyond

Ilfak Guilfanov

Track:

video audio presentation ppt

Got Citrix, Hack It!

Shanit Gupta

Track: Turbo Talks

video audio presentation ppt

Attacking the Vista Heap

Ben Hawkes

Track: 0-Day

video audio presentation ppt

The Four Horsemen of the Virtualization Security Apocalypse

Christofer Hoff

Track: Virtualization

video audio presentation ppt

Circumventing Automated JavaScript Analysis Tools

Billy Hoffman

Track:

video audio presentation ppt

Protecting Vulnerable Applications with IIS7

Brian Holyfield

Track: Turbo Talks

video audio presentation ppt

Virtually Secure

Oded Horovitz

Track: Virtualization

video audio presentation ppt

Metamorphic / Polymorphic Malware DNA

Chet Hosmer

Track: Turbo Talks

video audio presentation ppt

Pointers and Handles, A Story Of Unchecked Assumptions In The Windows Kernel

Alex Ionescu

Track: 0-Day

video audio presentation ppt

Black Ops 2008 -- Its The End Of The Cache As We Know It

Dan Kaminsky

Track: The Network

video audio presentation ppt

Vista and ActiveX Controls

Su Yong Kim

Track: Turbo Talks

video audio presentation ppt Extras/Tools

New Classes of Security and Privacy Vulnerabilities for Implantable Wireless Medical Devices

Tadayoshi Kohno, Kevin Fu

Track:

video audio presentation ppt

Jinx - Malware 2.0

Itzik Kotler, Jonathan Rom

Track: Bots & Malware

video audio presentation ppt Extras/Tools

Mobile Phone Messaging Anti-Forensics

Zane Lackey, Luis Miras

Track: Forensics

video audio presentation ppt

Deobfuscator: an Automated Approach to the Identification and Removal of Code Obfuscation

Eric Laspe

Track: Turbo Talks

video audio presentation ppt

Highway to Hell: Hacking Toll Systems

Nate Lawson

Track: OTA

video audio presentation ppt

Bluetooth v2.1 - a New Security Infrastructure and New Vulnerabilities

Andrew Lindell

Track: OTA

video audio presentation ppt

Developments in Cisco IOS Forensics

Felix Lindner

Track: Forensics

video audio presentation ppt

Oracle Forensics

David Litchfield

Track: Forensics & Anti Forensics

video audio presentation ppt

The Internet is Broken: Beyond Document.Cookie - Extreme Client Side Exploitation

Nathan McFeters, John Heasman, Rob Carter

Track: App Sec 1.0 / 2.0

video audio presentation ppt

Braving the Cold: New Methods for Preventing Cold Boot Attacks on Encryption Keys

Patrick McGregor

Track: 0-Day Defense

video audio presentation ppt

Pushing the Camel through the Eye of a Needle

SensePost

Track: Web 2.0

video audio presentation ppt

Meet the Feds 2008

Panel Discussion

video audio presentation ppt

Reverse DNS Tunneling Shellcode

Ty Miller

Track: 0-Day

video audio presentation ppt

Satan is on My Friends List: Attacking Social Networks

Shawn Moyer, Nathan Hamiel

Track: App Sec 1.0 / 2.0

video audio presentation ppt

Viral Infections in Cisco IOS

Ariel Futoransky

Track: Rootkit Arms Race

video audio presentation ppt

A Hypervisor IPS based on Hardware Assisted Virtualization Technology

Junichi Murakami

Track: Virtualization

video audio presentation ppt

Mifare -- Little Security, Despite Obscurity

Karsten Nohl

Track: Hardware

video audio presentation ppt

Living in the RIA World: Blurring the Line Between Web and Desktop Security

Alex Stamos, Justine Osborne

Track: App Sec 1.0 / 2.0

video audio presentation ppt

Mobitex Network Security

olleB

Track: OTA

video audio presentation ppt

Software Radio and the Future of Wireless Security

Michael Ossmann

Track: OTA

video audio presentation ppt

Playing by Virtual Security Rules: How Virtualization Changes Everything and What to Do About It

Steve Pate

Track: Turbo Talks

video audio presentation ppt

Client-side Security

Petko D. Petkov

Track: App Sec 1.0 / 2.0

video audio presentation ppt Extras/Tools

Malware Detection Through Network Flow Analysis

Bruce Potter

Track: The Network

video audio presentation ppt

Temporal Reverse Engineering

Danny Quist, Colin Ames

Track: Reverse Engineering

video audio presentation ppt

Secure the Planet! New Strategic Initiatives from Microsoft to Rock Your World

Mike Reavey, Steve Adegbite, Katie Moussouris

Track: Deep Knowledge

video audio presentation ppt Extras/Tools

No More Signatures: Defending Web Applications from 0-Day Attacks with ModProfiler UsingTraffic Profiling

Ivan Ristic, Ofer Shezaf

Track: 0-Day Defense

video audio presentation ppt

Alternative Medicine: The Malware Analyst's Blue Pill

Paul Royal

Track: Reverse Engineering

video audio presentation ppt Extras/Tools

Detecting & Preventing the Xen Hypervisor Subversions

Joanna Rutkowska, Rafal Wojtczuk

Track: Virtualization

video audio presentation ppt

Bluepilling the Xen Hypervisor

Alexander Tereshkin, Joanna Rutkowska

Track: Virtualization

video audio presentation ppt

Return-Oriented Programming: Exploits Without Code Injection

Hovav Shacham

Track: 0-Day

video audio presentation ppt

Meet The Owner Of a Real Hacked Company - Forensic Investigation

Mark Shelhart

Track: Turbo Talks

video audio presentation ppt

MetaPost-Exploitation

Val Smith, Colin Ames

Track: App Sec 1.0 / 2.0

video audio presentation ppt

How To Impress Girls With Browser Memory Protection Bypasses

Alexander Sotirov, Mark Dowd

Track: App Sec 1.0 / 2.0

video audio presentation ppt Extras/Tools

Deeper Door - Exploiting the NIC Chipset

Sherri Sparks, Shawn Embleton

Track: Root Kit Arms Race

video audio presentation ppt

A Fox in the Hen House (UPnP IGD)

Jonathan Squire

Track: Turbo Talks

video audio presentation ppt Extras/Tools

Living in the RIA World: Blurring the Line Between Web and Desktop Security

Alex Stamos

Track: App Sec 1.0 /2.0

video audio presentation ppt

Concurrency Attacks in Web Applications

Scott Stender

Track: App Sec 1.0 / 2.0

video audio presentation ppt

Protocols and Encryption of The Storm Botnet

Joe Stewart

Track: Bots & Malware

video audio presentation ppt

Xploiting Google Gadgets: Gmalware and Beyond

Tom Stracener

Track: Bots & Malware

video audio presentation ppt Extras/Tools

Windows Hibernation File for Fun and Profit.

Matthieu Suiche

Track: Deep Knowledge

video audio presentation ppt

REST for the Wicked

Bryan Sullivan

Track: Web 2.0

video audio presentation ppt

Inducing Momentary Faults Within Secure Smartcards / Microcontrollers

Christopher Tarnovsky

Track: Hardware

video audio presentation ppt

ePassports Reloaded

Jeroen van Beek

Track: Privacy & Anonymity

video audio presentation ppt

Nmap: Scanning the Internet

Fyodor Vaskovich

Track: The Network

video audio presentation ppt

Iron Chef: Fuzzing Challenge

Jacob West, Brian Chess, Charlie Miller, Sean Fay, Geoff Morrison, Jacob Honoroff

Track: 0-day

video video audio audio presentation ppt

Subverting the Xen Hypervisor

Rafal Wojtczuk

Track: Virtualization

video audio presentation ppt Extras/Tools

Leveraging the Edge: Abusing SSL VPNs

Mike Zusman

Track: The Network

video audio presentation ppt
Privacy Policy | Sponsorship Inquiry | DEFCON | Black Hat Main RSS Feed
1997-2009 Black Hat ™