DATE |
NAME |
CONFERENCE |
CATEGORIE |
WEB |
2023 |
VoBERT: Unstable Log Sequence Anomaly Detection: Introducing
Vocabulary-Free BERT |
Black Hat EU 2023 |
Security |
BlackHat |
2023 |
Unmasking APTs: An Automated Approach for Real-World Threat Attribution |
Black Hat EU 2023 |
APT |
BlackHat |
2023 |
Off The Record - Weaponizing DHCP DNS Dynamic Updates |
Black Hat EU 2023 |
Security |
BlackHat |
2023 |
One Million ASUS Routers Under Control: Exploiting ASUS DDNS to MITM
Admin Credentials |
Black Hat EU 2023 |
Hacking |
BlackHat |
2023 |
Kidnapping Without Hostages: Virtual Kidnapping and the Dark Road Ahead |
Black Hat EU 2023 |
AI |
BlackHat |
2023 |
Hacking Your Documentation: Who Should WTFM? |
Black Hat EU 2023 |
Hacking |
BlackHat |
2023 |
How We Taught ChatGPT-4 to Break mbedTLS AES With Side-Channel Attacks |
Black Hat EU 2023 |
AI |
BlackHat |
2023 |
A Security RISC? The State of Microarchitectural Attacks on RISC-V |
Black Hat EU 2023 |
Attack |
BlackHat |
2023 |
Old Code Dies Hard: Finding New Vulnerabilities in Old Third-Party
Software Components and the Importance of Having SBoM for IoT/OT Devices |
Black Hat EU 2023 |
Vulnerebility |
BlackHat |
2023 |
Illegitimate Data Protection Requests - To Delete or to Address? |
Black Hat EU 2023 |
Security |
BlackHat |
2023 |
How I Learned to Stop Worrying and Build a Modern Detection & Response
Program |
Black Hat EU 2023 |
Security |
BlackHat |
2023 |
Reviving JIT Vulnerabilities: Unleashing the Power of Maglev Compiler
Bugs on Chrome Browser |
Black Hat EU 2023 |
Exploit |
BlackHat |
2023 |
Deleting Your Domain? Preventing Data Leaks at TLD Scale |
Black Hat EU 2023 |
Hacking |
BlackHat |
2023 |
Breaching the Perimeter via Cloud Synchronized Browser Settings
PAPER |
Black Hat EU 2023 |
Security |
BlackHat |
2023 |
When The Front Door Becomes a Backdoor: The Security Paradox of OSDP |
Black Hat EU 2023 |
Virus |
BlackHat |
2023 |
The Pool Party You Will Never Forget: New Process Injection Techniques
Using Windows Thread Pools |
Black Hat EU 2023 |
Hacking |
BlackHat |
2023 |
Security Through Transparency: Scaling Your Customer Trust Program |
Black Hat EU 2023 |
Security |
BlackHat |
2023 |
Collide+Power: The Evolution of Software-based Power Side-Channels
Attacks |
Black Hat EU 2023 |
Attack |
BlackHat |
2023 |
TsuKing: Coordinating DNS Resolvers and Queries into Potent DoS
Amplifiers |
Black Hat EU 2023 |
Hacking |
BlackHat |
2023 |
Through the Looking Glass: How Open Source Projects See Vulnerability
Disclosure |
Black Hat EU 2023 |
Vulnerebility |
BlackHat |
2023 |
Indirect Prompt Injection Into LLMs Using Images and Sounds |
Black Hat EU 2023 |
Hacking |
BlackHat |
2023 |
Breaking Theoretical Limits: The Gap Between Virtual NICs and Physical
Network Cards |
Black Hat EU 2023 |
Hacking |
BlackHat |
2023 |
REDIScovering HeadCrab - A Technical Analysis of a Novel Malware and the
Mind Behind It |
Black Hat EU 2023 |
Malware |
BlackHat |
2023 |
A Decade After Stuxnet: How Siemens S7 is Still an Attacker's Heaven |
Black Hat EU 2023 |
IoT |
BlackHat |
2023 |
TunnelCrack: Leaking VPN Traffic by Manipulating Routing Tables |
Black Hat EU 2023 |
Hacking |
BlackHat |
2023 |
The Magnetic Pull of Mutable Protection: Worked Examples in
Cryptographic Agility |
Black Hat EU 2023 |
Cryptography |
BlackHat |
2023 |
AutoSpill: Zero Effort Credential Stealing from Mobile Password Managers |
Black Hat EU 2023 |
Mobil |
BlackHat |
2023 |
Millions of Patient Records at Risk: The Perils of Legacy Protocols |
Black Hat EU 2023 |
IoT |
BlackHat |
2023 |
LogoFAIL: Security Implications of Image Parsing During System Boot |
Black Hat EU 2023 |
Hardware |
BlackHat |
2023 |
HODOR: Reducing Attack Surface on Node.js via System Call Limitation |
Black Hat EU 2023 |
Hacking |
BlackHat |
2023 |
Evils in the Sparse Texture Memory: Exploit Kernel Based on Undefined
Behaviors of Graphic APIs |
Black Hat EU 2023 |
Exploit |
BlackHat |
2023 |
D1 COMMSEC - ALPChecker – Detecting Spoofing and Blinding Attacks -
Anastasiia Kropova & Igor Korkin.pdf |
hitbsecconf2023hkt | |
hitbsecconf |
2023 |
D1 COMMSEC - Bugs In Blocks - Karsten Nohl.pdf |
hitbsecconf2023hkt | |
hitbsecconf |
2023 |
D1 COMMSEC - Building a Full-Speed Anti-Censorship Router - Kaijern
Lau.pdf |
hitbsecconf2023hkt | |
hitbsecconf |
2023 |
D1 COMMSEC - Shining a Light On Solar System Cyber Security - Sick
Codes.pdf |
hitbsecconf2023hkt | |
hitbsecconf |
2023 |
D1 COMMSEC Big Match - How I Learned to Stop Reversing and Love the
Strings - Paolo Montesel.pdf |
hitbsecconf2023hkt | |
hitbsecconf |
2023 |
D1 LAB - Bring Your Own SOAR Automated Incident Response - Valentine
Mairet & Harjeet Sharma.pdf |
hitbsecconf2023hkt | |
hitbsecconf |
2023 |
D1T1 - An Ode to Rabbit Holes - Writing a New Decompiler Just for a
Security Audit - Dominic Couture.pdf |
hitbsecconf2023hkt | |
hitbsecconf |
2023 |
D1T1 - Cracking the Shield - Analyzing and Reverse Engineering Antivirus
Signatures - Dobin Rutishauser.pdf |
hitbsecconf2023hkt | |
hitbsecconf |
2023 |
D1T1 - Exploiting the Lexmark PostScript Stack - Aaron Adams.pdf |
hitbsecconf2023hkt | |
hitbsecconf |
2023 |
D1T1 - FrankeNAND – Extracting Info From Automotive Internet Units -
Alexey Kondikov.pdf |
hitbsecconf2023hkt | |
hitbsecconf |
2023 |
D1T1 - Hakuin - Injecting Brains Into Blind SQL Injection - Jakub
Pruzinec & Quynh Anh Nguyen.pdf |
hitbsecconf2023hkt | |
hitbsecconf |
2023 |
D1T1 - How NTLM Relay Ruins Your Exchange Servers - Tianze Ding -
pdf.pdf |
hitbsecconf2023hkt | |
hitbsecconf |
2023 |
D1T1 - It Was Harder to Sniff Bluetooth Through My Mask During The
Pandemic - Xeno Kovah.pdf |
hitbsecconf2023hkt | |
hitbsecconf |
2023 |
D1T2 - How to Design Your Own Electronic Attack Device - Shupeng Gao.pdf |
hitbsecconf2023hkt | |
hitbsecconf |
2023 |
D1T2 - Lazarus Groups Undercover Operations - Large-Scale Infection
Campaigns 2022 – 2023 - Lee Taewoo, Seulgi Lee, Dongwook Kim.pdf |
hitbsecconf2023hkt | |
hitbsecconf |
2023 |
D1T2 - Rogue CDB Escaping from VMware Workstation Through the Disk
Controller - Wenxu Yin.pdf |
hitbsecconf2023hkt | |
hitbsecconf |
2023 |
D1T2 - Timekiller - Leveraging Asynchronous Clock to Escape from QEMU
KVM - Jia, Lei, Tao & Pan.pdf |
hitbsecconf2023hkt | |
hitbsecconf |
2023 |
D1T2 - gVisor - Modern Linux Sandboxing Technology - Li Qiang.pdf |
hitbsecconf2023hkt | |
hitbsecconf |
2023 |
D2 COMMSEC - A Practical Method of Finding Vulnerabilities in Internet
of Things - IeckChae Euom.pdf |
hitbsecconf2023hkt | |
hitbsecconf |
2023 |
D2 COMMSEC - B(l)utter – Reversing Flutter Applications by using Dart
Runtime - Worawit Wangwarunyoo.pdf |
hitbsecconf2023hkt | |
hitbsecconf |
2023 |
D2 COMMSEC - The Future of Hacking - Unleashing the Power of OpenAIs
GPT-4 Code Interpreter - Dexter Ng.pdf |
hitbsecconf2023hkt | |
hitbsecconf |
2023 |
D2 COMMSEC - The Tragedy of Bluetooth Low Energy - Linfeng Xiao & Dalin
Yang.pdf |
hitbsecconf2023hkt | |
hitbsecconf |
2023 |
D2 COMMSEC - Unveiling the Covert Trails of Infostealer Malware
Ecosystems - Pavvan Karthick.pdf |
hitbsecconf2023hkt | |
hitbsecconf |
2023 |
D2T1 - Hacking into iOS VOLTE implementation - Hardik Mehta & Rajanish
Pathak.pdf |
hitbsecconf2023hkt | |
hitbsecconf |
2023 |
D2T1 - Hunting for Amazon Cognito Security Misconfigurations - Yassine
Aboukir.pdf |
hitbsecconf2023hkt | |
hitbsecconf |
2023 |
D2T1 - KeyBleed - Attacking the OneKey Mini - Eric Michaud.pdf |
hitbsecconf2023hkt | |
hitbsecconf |
2023 |
D2T1 - Locate Vulnerabilities of Ethereum Smart Contracts with
Semi-Automated Analysis - Boik Su.pdf |
hitbsecconf2023hkt | |
hitbsecconf |
2023 |
D2T1 - Scarlet OT – OT Adversary Emulation for Fun and Profit- Vic Huang
& Sol Yang.pdf |
hitbsecconf2023hkt | |
hitbsecconf |
2023 |
D2T1 - Windows Kernel Security - A Deep Dive into Two Exploits
Demonstrated at Pwn2Own - Thomas Imbert.pdf |
hitbsecconf2023hkt | |
hitbsecconf |
2023 |
D2T2 - Breaking ML Services - Finding 0-days in Azure Machine Learning -
NItesh Surana.pdf |
hitbsecconf2023hkt | |
hitbsecconf |
2023 |
D2T2 - From Unknown Parameter to Root - A Story of Unexpected Intrusion
Testing Results - Yvan Genuer.pdf |
hitbsecconf2023hkt | |
hitbsecconf |
2023 |
D2T2 - GPTHound – Your Active Directory Security Assistant - John
Jiang.pdf |
hitbsecconf2023hkt | |
hitbsecconf |
2023 |
D2T2 - NVMe - New Vulnerabilities Made Easy - Tal Lossos.pdf |
hitbsecconf2023hkt | |
hitbsecconf |
2023 |
D2T2 - TSSHOCK – Breaking MPC Wallets and Digital Custodians - Huu Giap
Nguyen & Anh Khoa Nguyen.pdf |
hitbsecconf2023hkt | |
hitbsecconf |
2023 |
D2T2 - Take a Picture of Your App Code – Android MRI Interpreter -
Sunghyoun Song.pdf |
hitbsecconf2023hkt | |
hitbsecconf |
2023 |
Aapo Oksman - certmitm automatic exploitation of TLS certificate
validation vulnerabilities-demo.mp4 |
DefCon31 |
|
DefCon |
2023 |
Aapo Oksman - certmitm automatic exploitation of TLS certificate
validation vulnerabilities.pdf |
DefCon31 |
|
DefCon |
2023 |
Adrian atrox Dabrowski Gabriel K. Gegenhuber - Cellular carriers hate
this trick Using SIM tunneling to travel at light speed.pdf |
DefCon31 |
|
DefCon |
2023 |
Alessandro klezVirus Magnosi Arash waldoirc Parsa Athanasios trickster0
Tserpelis - StackMoonwalk A Novel approach to stack spoofing on Windows
x64.pdf |
DefCon31 |
|
DefCon |
2023 |
Alex - Meduza How an exiled pirate media outlet breaks through the
Kremlin's propaganda firewall.pdf |
DefCon31 |
|
DefCon |
2023 |
Alex Tereshkin Adam Zabrocki - Breaking BMC The Forgotten Key to the
Kingdom-demo.mp4 |
DefCon31 |
|
DefCon |
2023 |
Alex Tereshkin Adam Zabrocki - Breaking BMC The Forgotten Key to the
Kingdom.pdf |
DefCon31 |
|
DefCon |
2023 |
Alexander Dalsgaard Krog Alexander Skovsende - Backdoor in the Core -
Altering the Intel x86 Instruction Set at Runtime-demo.mp4 |
DefCon31 |
|
DefCon |
2023 |
Alexander Dalsgaard Krog Alexander Skovsende - Backdoor in the Core -
Altering the Intel x86 Instruction Set at Runtime.pdf |
DefCon31 |
|
DefCon |
2023 |
Allan dwangoAC Cecil Sauraen Liam MLink Taylor - Legend of Zelda Use
After Free (TASBot glitches OoT).pdf |
DefCon31 |
|
DefCon |
2023 |
Allison Young Diane Akerman - Private Until Presumed Guilty.pdf |
DefCon31 |
|
DefCon |
2023 |
Andrew Brandt - Youre Not George Clooney and This Isnt Ocean's
Eleven.pdf |
DefCon31 |
|
DefCon |
2023 |
Andrew Brandt - Youre Not George Clooney and This Isnt Ocean's
Eleven.pptx |
DefCon31 |
|
DefCon |
2023 |
Andréanne Bergeron Olivier Bilodeau - I Watched You Roll the Die
Unparalleled RDP Monitoring Reveal Attackers Tradecraft.pdf |
DefCon31 |
|
DefCon |
2023 |
Anon - Mass Owning of Seedboxes - A Live Hacking Exhibition.pdf |
DefCon31 |
|
DefCon |
2023 |
Asi Greenholts - The GitHub Actions Worm Compromising GitHub
repositories through the Actions dependency tree-demo.mp4 |
DefCon31 |
|
DefCon |
2023 |
Asi Greenholts - The GitHub Actions Worm Compromising GitHub
repositories through the Actions dependency tree.pdf |
DefCon31 |
|
DefCon |
2023 |
Austin Emmitt - Apple's Predicament NSPredicate Exploitation on macOS
and iOS.pdf |
DefCon31 |
|
DefCon |
2023 |
Ben Nassi - Video-based Cryptanalysis Extracting Secret Keys from Power
LEDs of Various Non-compromised Devices Using a Video Camera.pdf |
DefCon31 |
|
DefCon |
2023 |
Ben Sadeghipour Corben Leo - A Series of Unfortunate Events.pptx |
DefCon31 |
|
DefCon |
2023 |
Benny Zeltser Jonathan Lusky - The RingHopper Journey or How We Almost
Zero-dayΓÇÖd the World.pptx |
DefCon31 |
|
DefCon |
2023 |
Benny Zeltser Jonathan Lusky - The RingHopper Journey or How We Almost
Zero-day’d the World-demo.mp4 |
DefCon31 |
|
DefCon |
2023 |
Benny Zeltser Jonathan Lusky - The RingHopper Journey or How We Almost
Zero-day’d the World.pptx |
DefCon31 |
|
DefCon |
2023 |
Bill Demirkapi - A SSLippery Slope Unraveling the Hidden Dangers of
Certificate Misuse.pdf |
DefCon31 |
|
DefCon |
2023 |
Bohan Liu Zheng Wang GuanCheng Li - ndays are also 0days Can hackers
launch 0day RCE attack on popular softwares only with chromium ndays.pdf |
DefCon31 |
|
DefCon |
2023 |
Bohan Liu Zheng Wang GuanCheng Li - ndays are also 0days Can hackers
launch 0day RCE attack on popular softwares only with chromium ndays.pdf |
DefCon31 |
|
DefCon |
2023 |
Carlo Meijer Wouter Bokslag Jos Wetzels - TETRA Tour de Force
Jailbreaking Digital Radios and Base Stations for Fun and Secrets.pdf |
DefCon31 |
|
DefCon |
2023 |
Carlos Polop Yago Gutierrez - Exploring Linux Memory Manipulation for
Stealth and Evasion Strategies to bypass Read-Only No-Exec and
Distroless Environments.pdf |
DefCon31 |
|
DefCon |
2023 |
Ceri Coburn - A Broken Marriage Abusing Mixed Vendor Kerberos
Stacks-demo.mp4 |
DefCon31 |
|
DefCon |
2023 |
Ceri Coburn - A Broken Marriage Abusing Mixed Vendor Kerberos Stacks.pdf |
DefCon31 |
|
DefCon |
2023 |
Christian quaddi Dameff MD Jacqueline Burgette Jeff r3plicant Tully MD
Nitin Natarajan Senator Mark Warner Suzanne Schwartz MD - D0 N0 H4RM A
Healthcare Security Conversation.pdf |
DefCon31 |
|
DefCon |
2023 |
Christien DilDog Rioux Katelyn Medus4 Bowden - The Internals of Veilid a
New Decentralized Application Framework.pdf |
DefCon31 |
|
DefCon |
2023 |
Christopher Wade - Physical Attacks Against Smartphones-demo1.mp4 |
DefCon31 |
|
DefCon |
2023 |
Christopher Wade - Physical Attacks Against Smartphones-demo2.mp4 |
DefCon31 |
|
DefCon |
2023 |
Christopher Wade - Physical Attacks Against Smartphones.pdf |
DefCon31 |
|
DefCon |
2023 |
Dan Borgogno Ileana Barrionuevo - Turning my virtual wallet into a
skimming device mPOS solutions.pdf |
DefCon31 |
|
DefCon |
2023 |
Dan Petro David Vargas - Badge of Shame Breaking into Secure Facilities
with OSDP.pdf |
DefCon31 |
|
DefCon |
2023 |
Daniel Avinoam - Contain Yourself Staying Undetected Using the Windows
Container Isolation Framework.pdf |
DefCon31 |
|
DefCon |
2023 |
Daniel Wegemer - Unlocking hidden powers in Xtensa based Qualcomm Wifi
chips-demo.mp4 |
DefCon31 |
|
DefCon |
2023 |
Daniel Wegemer - Unlocking hidden powers in Xtensa based Qualcomm Wifi
chips.pdf |
DefCon31 |
|
DefCon |
2023 |
Daniel dos Santos Simon Guiot - Route to bugs Analyzing the security of
BGP message parsing-demo.mp4 |
DefCon31 |
|
DefCon |
2023 |
Daniel dos Santos Simon Guiot - Route to bugs Analyzing the security of
BGP message parsing.pdf |
DefCon31 |
|
DefCon |
2023 |
David Leadbeater - Terminally Owned - 60 years of escaping.pdf |
DefCon31 |
|
DefCon |
2023 |
David McGrew Brandon Enright Andrew Chi - Assessing the Security of
Certificates at Scale.pdf |
DefCon31 |
|
DefCon |
2023 |
David Melendez Gabriela Gabs García - Spread spectrum techniques in
disposable drones for anti drone evasion-demo1.mp4 |
DefCon31 |
|
DefCon |
2023 |
David Melendez Gabriela Gabs García - Spread spectrum techniques in
disposable drones for anti drone evasion-demo2.mp4 |
DefCon31 |
|
DefCon |
2023 |
David Melendez Gabriela Gabs García - Spread spectrum techniques in
disposable drones for anti drone evasion-demo3.mp4 |
DefCon31 |
|
DefCon |
2023 |
David Melendez Gabriela Gabs García - Spread spectrum techniques in
disposable drones for anti drone evasion.pdf |
DefCon31 |
|
DefCon |
2023 |
Dennis Giese - Vacuum robot security and privacy - prevent your robot
from sucking your data.pdf |
DefCon31 |
|
DefCon |
2023 |
Dennis Giese - Vacuum robot security and privacy - prevent your robot
from sucking your data.pptx |
DefCon31 |
|
DefCon |
2023 |
Dongsung Donny Kim - Your Clocks Have Ears - Timing-Based Browser-Based
Local Network Port Scanner-demo.mp4 |
DefCon31 |
|
DefCon |
2023 |
Dongsung Donny Kim - Your Clocks Have Ears - Timing-Based Browser-Based
Local Network Port Scanner.pdf |
DefCon31 |
|
DefCon |
2023 |
Dongsung Donny Kim - Your Clocks Have Ears Timing-Based Browser-Based
Local Network Port Scanner-demo.mp4 |
DefCon31 |
|
DefCon |
2023 |
Dr. Bramwell Brizendine Max Libra Kersten Jake Hince - Game-Changing
Advances in Windows Shellcode Analysis-demo1.mp4 |
DefCon31 |
|
DefCon |
2023 |
Dr. Bramwell Brizendine Max Libra Kersten Jake Hince - Game-Changing
Advances in Windows Shellcode Analysis-demo2.mp4 |
DefCon31 |
|
DefCon |
2023 |
Dr. Bramwell Brizendine Max Libra Kersten Jake Hince - Game-Changing
Advances in Windows Shellcode Analysis.pdf |
DefCon31 |
|
DefCon |
2023 |
Dr. Bramwell Brizendine Shiva Shashank Kusuma - Advanced ROP Framework
Pushing ROP to Its Limits-demo1.mp4 |
DefCon31 |
|
DefCon |
2023 |
Dr. Bramwell Brizendine Shiva Shashank Kusuma - Advanced ROP Framework
Pushing ROP to Its Limits-demo2.mp4 |
DefCon31 |
|
DefCon |
2023 |
Dr. Bramwell Brizendine Shiva Shashank Kusuma - Advanced ROP Framework
Pushing ROP to Its Limits-demo3.mp4 |
DefCon31 |
|
DefCon |
2023 |
Dr. Bramwell Brizendine Shiva Shashank Kusuma - Advanced ROP Framework
Pushing ROP to Its Limits-whitepaper.pdf |
DefCon31 |
|
DefCon |
2023 |
Dr. Bramwell Brizendine Shiva Shashank Kusuma - Advanced ROP Framework
Pushing ROP to Its Limits.pdf |
DefCon31 |
|
DefCon |
2023 |
Dr. Bramwell Brizendine Shiva Shashank Kusuma - Advanced ROP Framework
Pushing ROP to Its Limits.pptx |
DefCon31 |
|
DefCon |
2023 |
Dr. Nestori Syynimaa - From Feature to Weapon Breaking Microsoft Teams
and SharePoint Integrity.pdf |
DefCon31 |
|
DefCon |
2023 |
Duckie - J4 Gate The Hustler Poker Cheating Scandal investigation and
how Hacking helped me do it-game-video.mp4 |
DefCon31 |
|
DefCon |
2023 |
Duckie - J4 Gate The Hustler Poker Cheating Scandal investigation and
how Hacking helped me do it.pdf |
DefCon31 |
|
DefCon |
2023 |
ElfMaster - Revolutionizing ELF binary patching with Shiva A JIT binary
patching system for Linux-demo.mp4 |
DefCon31 |
|
DefCon |
2023 |
ElfMaster - Revolutionizing ELF binary patching with Shiva A JIT binary
patching system for Linux.pdf |
DefCon31 |
|
DefCon |
2023 |
Farzan Karimi Xuan Xing Xiling Gong Eugene Rodionov - Over the Air Under
the Radar Attacking and Securing the Pixel Modem-demo.mp4 |
DefCon31 |
|
DefCon |
2023 |
Farzan Karimi Xuan Xing Xiling Gong Eugene Rodionov - Over the Air Under
the Radar Attacking and Securing the Pixel Modem.pdf |
DefCon31 |
|
DefCon |
2023 |
Gal Zror - Look Ma I'm the CEO Real-Time Video and Audio Deep-Fake.pptx |
DefCon31 |
|
DefCon |
2023 |
James 'albinowax' Kettle - Smashing the state machine the true potential
of web race conditions-whitepaper.pdf |
DefCon31 |
|
DefCon |
2023 |
James 'albinowax' Kettle - Smashing the state machine the true potential
of web race conditions.pdf |
DefCon31 |
|
DefCon |
2023 |
James Horseman Zach Hanley - New Isnt Always Novel Greping Your Way to
20K at Pwn2Own and How You Can Too.pdf |
DefCon31 |
|
DefCon |
2023 |
Joe Slowik - Burrowing Through The Network Contextualizing The Vulkan
Leaks Historical State-Sponsored Offensive Operations.pdf |
DefCon31 |
|
DefCon |
2023 |
Joe Sullivan - A Different Uber Post Mortem.pdf |
DefCon31 |
|
DefCon |
2023 |
John Novak - Azure B2C 0-Day An Exploit Chain from Public Keys to
Microsoft Bug Bounty.pdf |
DefCon31 |
|
DefCon |
2023 |
Jonathan Bar Or Michael Pearse Anurag Bohra - Getting a Migraine -
uncovering a unique SIP bypass on macOS-demo.mp4 |
DefCon31 |
|
DefCon |
2023 |
Jonathan Bar Or Michael Pearse Anurag Bohra - Getting a Migraine -
uncovering a unique SIP bypass on macOS.pdf |
DefCon31 |
|
DefCon |
2023 |
Jonathan Birch - Second Breakfast Implicit and Mutation-Based
Serialization Vulnerabilities in .NET-whitepaper.pdf |
DefCon31 |
|
DefCon |
2023 |
Jonathan Birch - Second Breakfast Implicit and Mutation-Based
Serialization Vulnerabilities in .NET.pdf |
DefCon31 |
|
DefCon |
2023 |
Josep Pi Rodriguez - Contactless Overflow Code execution in payment
terminals and ATM’s over NFC.pdf |
DefCon31 |
|
DefCon |
2023 |
Joseph Gabay - Warshopping - Further Phreaking Smart Shopping Cart
Wheels Through RF Sniffing and Hardware Reverse Engineering-sound.mp3 |
DefCon31 |
|
DefCon |
2023 |
Joseph Gabay - Warshopping - Further Phreaking Smart Shopping Cart
Wheels Through RF Sniffing and Hardware Reverse Engineering.pdf |
DefCon31 |
|
DefCon |
2023 |
Katie Inns - HL7Magic Medical Data Hacking Made Easy.pdf |
DefCon31 |
|
DefCon |
2023 |
Katitza Rodriguez Bill Budington - UNConventional Cybercrime How a Bad
Anti-Hacking Treaty is Becoming a Law.pdf |
DefCon31 |
|
DefCon |
2023 |
Laurie Kirk - Runtime Riddles Abusing Manipulation Points in the Android
Source.pdf |
DefCon31 |
|
DefCon |
2023 |
Lorenzo Cococcia - You can't cheat time - Finding foes and yourself with
latency trilateration..pdf |
DefCon31 |
|
DefCon |
2023 |
Matthew Harris Zachary Bertocchi Scott Campbell Noah Gibson - Boston
Infinite Money Glitch Hacking Transit Cards Without Ending Up In
Handcuffs-demo.mp4 |
DefCon31 |
|
DefCon |
2023 |
Matthew Harris Zachary Bertocchi Scott Campbell Noah Gibson - Boston
Infinite Money Glitch Hacking Transit Cards Without Ending Up In
Handcuffs.pdf |
DefCon31 |
|
DefCon |
2023 |
Maxime Clementz - Defeating VPN Always-On.pdf |
DefCon31 |
|
DefCon |
2023 |
Miana Ella Windall - Designing RFID Implants How flipping the bird opens
doors for me.pdf |
DefCon31 |
|
DefCon |
2023 |
Michael Stepankin - mTLS when certificate authentication done wrong.pdf |
DefCon31 |
|
DefCon |
2023 |
Mikhail
Shcherbakov Musard Balliu - Silent Spring Prototype Pollution Leads to
Remote Code Execution in Node.js.pdf |
DefCon31 |
|
DefCon |
2023 |
Mikko Hypponen - Living Next Door to Russia.pdf |
DefCon31 |
|
DefCon |
2023 |
NiNi Chen - A Comprehensive Review on the Less-Traveled Road 9 Years of
Overlooked MikroTik Pre-Auth RCE.pdf |
DefCon31 |
|
DefCon |
2023 |
Nicolas Minvielle Xavier Facélina - Looking into the future what can we
learn about hacking in science-fiction.pdf |
DefCon31 |
|
DefCon |
2023 |
Nils Amiet Marco Macchetti - Polynonce An ECDSA Attack and Polynomial
Dance-demo.mp4 |
DefCon31 |
|
DefCon |
2023 |
Nils Amiet Marco Macchetti - Polynonce An ECDSA Attack and Polynomial
Dance.pdf |
DefCon31 |
|
DefCon |
2023 |
Noam Moshe Sharon Brizinov - A Pain in the NAS Exploiting Cloud
Connectivity to PWN your NAS.pdf |
DefCon31 |
|
DefCon |
2023 |
Omer Attias - The Price of Convenience How Security Vulnerabilities in
Global Transportation Payment Systems Can Cost You.pdf |
DefCon31 |
|
DefCon |
2023 |
Patrick Wardle - Demystifying ( Bypassing) macOS's Background Task
Management.pdf |
DefCon31 |
|
DefCon |
2023 |
Patrick Wardle - Nothing but Net Leveraging macOS's Networking
Frameworks to Heuristically Detect Malware.pdf |
DefCon31 |
|
DefCon |
2023 |
Paz Hameiri - CON trolling the weather.pdf |
DefCon31 |
|
DefCon |
2023 |
R.J. McDown - Malware design - abusing legacy Microsoft transports and
session architecture.pdf |
DefCon31 |
|
DefCon |
2023 |
Renderman Thomas Dang - Damned if you do - The risks of pointing out the
emperor is buck naked.pdf |
DefCon31 |
|
DefCon |
2023 |
Ricky Lawshae - Fantastic Ethertypes and Where to Find Them.pdf |
DefCon31 |
|
DefCon |
2023 |
Ron Ben-Yizhak - NoFilter Abusing Windows Filtering Platform for
privilege escalation.pdf |
DefCon31 |
|
DefCon |
2023 |
Ryan Johnson Mohamed Elsabagh Angelos Stavrou - Still Vulnerable Out of
the Box Revisiting the Security of Prepaid Android Carrier Devices.pdf |
DefCon31 |
|
DefCon |
2023 |
STÖK - Weaponizing Plain Text ANSI Escape Sequences as a Forensic
Nightmare.pdf |
DefCon31 |
|
DefCon |
2023 |
Sam Quinn Jesse Chick - Power Corrupts Corrupt It Back Hacking Power
Management in Data Centers.pdf |
DefCon31 |
|
DefCon |
2023 |
Sharon Brizinov Noam Moshe - Exploiting OPC-UA in Every Possible Way
Practical Attacks Against Modern OPC-UA Architectures.pdf |
DefCon31 |
|
DefCon |
2023 |
Sven Cattell Rumman Chowdhury Austin Carson - Growing the Community of
AI Hackers with the Generative Red Team.pdf |
DefCon31 |
|
DefCon |
2023 |
Taiiwo Artorias Puck TheClockworkBird - Cracking Cicada 3301 The Future
of Collaborative Puzzle-Solving.pdf |
DefCon31 |
|
DefCon |
2023 |
Taiiwo Artorias Puck TheClockworkBird - Cracking Cicada 3301 The Future
of Collaborative Puzzle-Solving.pptx |
DefCon31 |
|
DefCon |
2023 |
Tal Skverer - GhostToken Exploiting Google Cloud Platform App
Infrastructure to Create Unremovable Trojan Apps.pdf |
DefCon31 |
|
DefCon |
2023 |
Tamas Jos - Spooky authentication at a distance-demo.mp4 |
DefCon31 |
|
DefCon |
2023 |
Tamas Jos - Spooky authentication at a distance-demo2.mp4 |
DefCon31 |
|
DefCon |
2023 |
Tamas Jos - Spooky authentication at a distance.pdf |
DefCon31 |
|
DefCon |
2023 |
Thomas Chauchefoin Paul Gerste - Visual Studio Code is why I have
(Workspace) Trust issues.pdf |
DefCon31 |
|
DefCon |
2023 |
Tiffany Rad Austin Shamlin - Civil Cyber Defense Use Your Resources to
Defend Non-Profits as they Combat Human Trafficking and Subvert
Authoritarian Regimes.pdf |
DefCon31 |
|
DefCon |
2023 |
Tom Pohl - Private Keys in Public Places.pdf |
DefCon31 |
|
DefCon |
2023 |
Tomer Bar Omer Attias - Defender-Pretender When Windows Defender Updates
Become a Security Risk.pdf |
DefCon31 |
|
DefCon |
2023 |
Tomer Bar Omer Attias - Defender-Pretender When Windows Defender Updates
Become a Security Risk.pptx |
DefCon31 |
|
DefCon |
2023 |
Tracy Mosley - Nuthin But A G Thang Evolution of Cellular Networks.pdf |
DefCon31 |
|
DefCon |
2023 |
Trevor Stevado Sam Haskins - Unlocking Doors from Half a Continent
Away-demo.mp4 |
DefCon31 |
|
DefCon |
2023 |
Trevor Stevado Sam Haskins - Unlocking Doors from Half a Continent
Away.pdf |
DefCon31 |
|
DefCon |
2023 |
Vangelis Stykas - The Art of Compromising C2 Servers A Web Application
Vulnerabilities Perspective.pptx |
DefCon31 |
|
DefCon |
2023 |
Wesley McGrew - Retro Exploitation Using Vintage Computing Plaforms as a
Vulnerability Research Playground and Learning Environment.pdf |
DefCon31 |
|
DefCon |
2023 |
Wojciech Reguła - ELECTRONizing macOS privacy - a new weapon in your red
teaming armory.pdf |
DefCon31 |
|
DefCon |
2023 |
X - LLMs at the Forefront Pioneering the Future of Fuzz Testing in a
Rapidly Changing World.pdf |
DefCon31 |
|
DefCon |
2023 |
byt3bl33d3r - SpamChannel Spoofing Emails From 2 Million Domains and
Virtually Becoming Satan-demo.mp4 |
DefCon31 |
|
DefCon |
2023 |
byt3bl33d3r - SpamChannel Spoofing Emails From 2 Million Domains and
Virtually Becoming Satan.pdf |
DefCon31 |
|
DefCon |
2023 |
cooperq - Tracking the Worlds Dumbest Cyber-Mercenaries.pdf |
DefCon31 |
|
DefCon |
2023 |
good pseudonym - Calling it a 0-Day - Hacking at PBXUC Systems.pdf |
DefCon31 |
|
DefCon |
2023 |
nullagent rekcahdam - Snoop on to them as they snoop on to us.pdf |
DefCon31 |
|
DefCon |
2023 |
nyxgeek - Track the Planet Mapping Identities Monitoring Presence and
Decoding Business Alliances in the Azure Ecosystem.pdf |
DefCon31 |
|
DefCon |
2023 |
winn0na and Panel - Hacker Court Interactive Scenario.pptx |
DefCon31 |
|
DefCon |
2023 |
A Manufacturer's Post-Shipment Approach to Fend-Off IoT Malware in
Home Appliances - Black Hat USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
A Pain in the NAS: Exploiting Cloud Connectivity to PWN Your NAS - Black
Hat USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
AI Assisted Decision Making of Security Review Needs for New Features -
Black Hat USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
All Cops Are Broadcasting: Breaking TETRA After Decades in the Shadows -
Black Hat USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
All You Need is Guest - Black Hat USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Bad io_uring: A New Era of Rooting for Android - Black Hat USA 2023 |
Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Badge of Shame: Breaking into Secure Facilities with OSDP - Black Hat
USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Becoming a Dark Knight: Adversary Emulation Demonstration for ATT&CK
Evaluations - Black Hat USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
BingBang: Hacking Bing.com (and much more) with Azure Active Directory -
Black Hat USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Bridging Cyber and Insurance - Black Hat USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
BTD: Unleashing the Power of Decompilation for x86 Deep Neural Network
Executables - Black Hat USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Civil Cyber Defense: Use Your Resources to Defend Non-Profits as They
Combat Human Trafficking and Subvert Authoritarian Regimes - Black Hat
USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Close Encounters of the Advanced Persistent Kind: Leveraging Rootkits
for Post-Exploitation - Black Hat USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
CoDe16; 16 Zero-Day Vulnerabilities Affecting CODESYS Framework Leading
to Remote Code Execution on Millions of Industrial Devices Across
Industries - Black Hat USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
CodeQL: Also a Powerful Binary Analysis Engine - Black Hat USA 2023 |
Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Compromising LLMs: The Advent of AI Malware - Black Hat USA 2023 |
Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Cookie Crumbles: Unveiling Web Session Integrity Vulnerabilities - Black
Hat USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Core Escalation: Unleashing the Power of Cross-Core Attacks on
Heterogeneous System - Black Hat USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Defender-Pretender: When Windows Defender Updates Become a Security Risk
- Black Hat USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Devising and Detecting Phishing: Large Language Models (GPT3, GPT4) vs.
Smaller Human Models (V-Triad, Generic Emails) - Black Hat USA 2023 |
Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Dive into Apple UserFS (Userspace Filesystem) - Black Hat USA 2023 |
Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Diversity Microtalks: Perspectives on Creating Change - Black Hat USA
2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Diving into Windows Remote Access Service for Pre-Auth Bugs - Black Hat
USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Does Public Disclosure of Vulnerabilities Affect Hacker Participation in
Bug Bounty Programs? - Black Hat USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
EDR = Erase Data Remotely, By Cooking An Unforgettable (Byte) Signature
Dish - Black Hat USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Endoscope: Unpacking Android Apps with VM-Based Obfuscation - Black Hat
USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Evading Logging in the Cloud: Bypassing AWS CloudTrail - Black Hat USA
2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Evasive Maneuvers: Trends in Phishing Evasion & Anti-Evasion - Black Hat
USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Exploiting OPC-UA in Every Possible Way: Practical Attacks Against
Modern OPC-UA Architectures - Black Hat USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
From Dead Data to Digestion: Extracting Windows Fibers for Your Digital
Forensics Diet - Black Hat USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Hot Topics in Cyber and Privacy Regulation - Black Hat USA 2023 |
Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Houston, We Have a Problem: Analyzing the Security of Low Earth Orbit
Satellites - Black Hat USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Chained to Hit: Discovering New Vectors to Gain Remote and Root Access
in SAP Enterprise Software - Black Hat USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
I Was Tasked With Enrolling Millions of Developers in 2FA - Here's
What Happened - Black Hat USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
I Watched You Roll the Die: Unparalleled RDP Monitoring Reveal
Attackers' Tradecraft - Black Hat USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Identifying and Reducing Permission Explosion in AWS: A Graph-Based and
Analytical Approach - Black Hat USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Input Output + Syslog (iO+S): Obtaining Data From Locked iOS Devices via
Live Monitoring - Black Hat USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
IRonMAN: InterpRetable Incident Inspector Based ON Large-Scale Language
Model and Association miNing - Black Hat USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Jailbreaking an Electric Vehicle in 2023 or What It Means to Hotwire
Tesla's x86-Based Seat Heater - Black Hat USA 2023 | Briefings
Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Know Thy Enemy: The Taxonomies That Meta Uses to Map the Offensive
Privacy Space - Black Hat USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Lemons and Liability: Cyber Warranties as an Experiment in Software
Regulation - Black Hat USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Leverage and Demonstrate Value with your Cyber Insurance Renewal - Black
Hat USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Lifting the Fog of War - Monitoring, Identifying and Mitigating MS-RPC
Based Threats - Black Hat USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Lost Control: Breaking Hardware-Assisted Kernel Control-Flow Integrity
with Page-Oriented Programming - Black Hat USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Low-level RASP: Protecting Applications Implemented in High-level
Programming Languages - Black Hat USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
MaginotDNS: Attacking the Boundary of DNS Caching Protection - Black Hat
USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Make KSMA Great Again: The Art of Rooting Android Devices by GPU MMU
Features - Black Hat USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Making and Breaking NSA's Codebreaker Challenge - Black Hat USA 2023 |
Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Mirage: Cyber Deception Against Autonomous Cyber Attacks - Black Hat USA
2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
MoustachedBouncer: AitM-Powered Surveillance via Belarus ISPs - Black
Hat USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
mTLS: When Certificate Authentication is Done Wrong - Black Hat USA 2023
| Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
ODDFuzz: Hunting Java Deserialization Gadget Chains via Structure-Aware
Directed Greybox Fuzzing - Black Hat USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
One Drive, Double Agent: Clouded OneDrive Turns Sides - Black Hat USA
2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Oven Repair (The Hardware Hacking Way) - Black Hat USA 2023 | Briefings
Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Over the Air, Under the Radar: Attacking and Securing the Pixel Modem -
Black Hat USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Physical Attacks Against Smartphones - Black Hat USA 2023 | Briefings
Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Protecting the CISO: A Legal Journey - Black Hat USA 2023 | Briefings
Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Reflections on Trust in the Software Supply Chain - Black Hat USA 2023 |
Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Route to Bugs: Analyzing the Security of BGP Message Parsing - Black Hat
USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Second Breakfast: Implicit and Mutation-Based Serialization
Vulnerabilities in .NET - Black Hat USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Seeing Through the Invisible: Radiation Spikes Detected in Chernobyl
During the Russian Invasion Show Possible Evidence of Fabrication -
Black Hat USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Single Instruction Multiple Data Leaks in Cutting-edge CPUs, AKA
Downfall - Black Hat USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Small Leaks, Billions Of Dollars: Practical Cryptographic Exploits That
Undermine Leading Crypto Wallets - Black Hat USA 2023 | Briefings
Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Smashing the State Machine: The True Potential of Web Race Conditions -
Black Hat USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
The Integration Cyber Security and Insurance: The Journey of Cysurance -
Black Hat USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
The Living Dead: Hacking Mobile Face Recognition SDKs with Non-Deepfake
Attacks - Black Hat USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
The Most Dangerous Codec in the World: Finding and Exploiting
Vulnerabilities in H.264 Decoders - Black Hat USA 2023 | Briefings
Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
The Yandex Leak: How a Russian Search Giant Uses Consumer Data - Black
Hat USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Three New Attacks Against JSON Web Tokens - Black Hat USA 2023 |
Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Uncovering Azure's Silent Threats: A Journey into Cloud
Vulnerabilities - Black Hat USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Unsafe At Any Speed: CISA's Plan to Foster Tech Ecosystem Security -
Black Hat USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Weaponizing Plain Text: ANSI Escape Sequences as a Forensic Nightmare -
Black Hat USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
What Does an LLM-Powered Threat Intelligence Program Look Like? - Black
Hat USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
When a Zero Day and Access Keys Collide in the Cloud: Responding to the
SugarCRM 0-Day Vulnerability - Black Hat USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Why Cyber Insurance Should be Your SOC's New Best Friend - Black Hat USA
2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Zero-Touch-Pwn: Abusing Zoom's Zero Touch Provisioning for Remote
Attacks on Desk Phones - Black Hat USA 2023 | Briefings Schedule |
Black Hat USA 2023 | |
BlackHat |
2023 |
Keynote - Preparing the Long Journey for Data Security |
Black Hat ASIA 2023 |
Security |
BlackHat |
2023 |
Alice in Kernel Land: Lessons Learned From the eBPF Rabbit Hole
whitepaper |
Black Hat ASIA 2023 |
Exploit |
BlackHat |
2023 |
Revisiting Stealthy Sensitive Information Collection from Android Apps |
Black Hat ASIA 2023 |
Mobile |
BlackHat |
2023 |
When Knowledge Graph Meets TTPs: Highly Automated and Adaptive
Executable TTP Intelligence for Security Evaluation
whitepaper |
Black Hat ASIA 2023 |
Security |
BlackHat |
2023 |
Dilemma in IoT Access Control: Revealing Novel Attacks and Design
Challenges in Mobile-as-a-Gateway IoT |
Black Hat ASIA 2023 |
IoT |
BlackHat |
2023 |
Operation Clairvoyance: How APT Groups Spy on the Media Industry |
Black Hat ASIA 2023 |
Malware |
BlackHat |
2023 |
Two Bugs With One PoC: Rooting Pixel 6 From Android 12 to Android 13 |
Black Hat ASIA 2023 |
Exploit |
BlackHat |
2023 |
Dirty Stream Attack, Turning Android Share Targets Into Attack Vectors |
Black Hat ASIA 2023 |
Mobile |
BlackHat |
2023 |
Grand Theft House: RF Lock Pick Tool to Unlock Smart Door Lock |
Black Hat ASIA 2023 |
Security |
BlackHat |
2023 |
Prototype Pollution Leads to RCE: Gadgets Everywhere |
Black Hat ASIA 2023 |
Security |
BlackHat |
2023 |
Insider Threats Packing Their Bags With Corporate Data |
Black Hat ASIA 2023 |
Security |
BlackHat |
2023 |
PMFault: Voltage Fault Injection on Server Platforms Through the PMBus |
Black Hat ASIA 2023 |
Security |
BlackHat |
2023 |
PPLdump Is Dead. Long Live PPLdump! |
Black Hat ASIA 2023 |
Exploit |
BlackHat |
2023 |
firmWar: An Imminent Threat to the Foundation of Computing |
Black Hat ASIA 2023 |
Security |
BlackHat |
2023 |
Leveraging Streaming-Based Outlier Detection and SliceLine to Stop
Heavily Distributed Bot Attacks
whitepaper |
Black Hat ASIA 2023 |
Security |
BlackHat |
2023 |
Nakatomi Space: Lateral Movement as L1 Post-exploitation in OT |
Black Hat ASIA 2023 |
Security |
BlackHat |
2023 |
Dirty Bin Cache: A New Code Injection Poisoning Binary Translation Cache |
Black Hat ASIA 2023 |
Exploit |
BlackHat |
2023 |
E-Meet (or Emit?) My Keystrokes: How Benign Screen-sharing Meetings
Could Leak Typing Behaviors |
Black Hat ASIA 2023 |
Security |
BlackHat |
2023 |
Sweet Dreams: Abusing Sleep Mode to Break Wi-Fi Encryption and Disrupt
WPA2/3 Networks |
Black Hat ASIA 2023 |
Security |
BlackHat |
2023 |
Hand Me Your SECRET, MCU! Microarchitectural Timing Attacks on
Microcontrollers are Practical |
Black Hat ASIA 2023 |
Security |
BlackHat |
2023 |
New Wine in an Old Bottle: Attacking Chrome WebSQL |
Black Hat ASIA 2023 |
Exploit |
BlackHat |
2023 |
Security Advocacy Shouldn't Be for Security Professionals: An Analysis
of How the Industry Misses the Mark and How We Can Improve |
Black Hat ASIA 2023 |
Security |
BlackHat |
2023 |
Weaponizing Mobile Infrastructure: Are Politically Motivated Cyber
Attacks a Threat to Democracy? |
Black Hat ASIA 2023 |
Security |
BlackHat |
2023 |
A New Attack Interface in Java Applications |
Black Hat ASIA 2023 |
Security |
BlackHat |
2023 |
A Run a Day Won't Keep the Hacker Away: Inference Attacks on Endpoint
Privacy Zones in Fitness Tracking Social Networks
whitepaper |
Black Hat ASIA 2023 |
Security |
BlackHat |
2023 |
Fuzzing the Native NTFS Read-Write Driver (NTFS3) in the Linux Kernel |
Black Hat ASIA 2023 |
Exploit |
BlackHat |
2023 |
Attacking the WebAssembly Compiler of WebKit |
Black Hat ASIA 2023 |
Security |
BlackHat |
2023 |
Phoenix Domain Attack: Vulnerable Links in Domain Name Delegation and
Revocation
whitepaper |
Black Hat ASIA 2023 |
Security |
BlackHat |
2023 |
You Can Run, but You Can't Hide - Finding the Footprints of Hidden
Shellcode |
Black Hat ASIA 2023 |
Malware |
BlackHat |
2023 |
Breaking the Chain: An Attacker's Perspective on Supply Chain
Vulnerabilities and Flaws |
Black Hat ASIA 2023 |
Security |
BlackHat |
2023 |
Cloudy With a Chance of Exploits: Compromising Critical Infrastructure
Through IIoT Cloud Solutions |
Black Hat ASIA 2023 |
Security |
BlackHat |