InfoconDB
Toggle navigation
Support
About
InfoconDB
Black Hat
Black Hat Asia 2020
Black Hat Asia 2020
Virtual
Black Hat Asia 2020
took place Sept. 29, 2020 through Oct. 2, 2020 (4 years, 2 months ago).
https://www.blackhat.com/asia-20/
Presentations
Thursday, Oct. 1, 2020
09:00 -
Engineering Cybersecurity for a Nation: What Singapore is Learning from Cars and Sanitation
10:20 -
Demystify Today's Binary Disassembling and How Modern ABI Makes it Easier
10:20 -
BitLeaker: Subverting BitLocker with One Vulnerability
10:20 -
The Evil Alt-Ego: (ab)using HTTP Alternative Services
10:20 -
The Evil of Spy Camera
11:20 -
3d Red Pill: A Guest-to-Host Escape on QEMU/KVM Virtio Device
11:20 -
Faking a Factory: Creating and Operating a Realistic Honeypot
11:20 -
Securing the Next Version of HTTP: How QUIC and HTTP/3 Compare to HTTP/2
12:30 -
CDPwn: Taking Over Millions of Enterprise-Things with Layer 2 Zero-Days
12:30 -
Dynamic Binary Instrumentation Techniques to Address Native Code Obfuscation
12:30 -
Making an Impact from India to the Rest of the World by Building and Nurturing Women Infosec Community
13:30 -
What the Log?! So Many Events, so Little Time...
13:30 -
WIFI-Important Remote Attack Surface: Threat is Expanding
13:30 -
Tracking the Criminal of Fake News Based on a Unified Embedding
13:30 -
The Inside Story: There are Apps in Apps and Here is How to Break Them
14:20 -
Wi-Fi Brokering
14:20 -
Walking Your Dog in Multiple Forests - Breaking AD Trust Boundaries through Kerberos Vulnerabilities
14:20 -
Page Cache Attacks: Microarchitectural Attacks on Flawless Hardware
14:20 -
First Contact - Vulnerabilities in Contactless Payments
15:20 -
Locknote: Conclusions and Key Takeaways from Day 1
Friday, Oct. 2, 2020
09:00 -
Complexity Killed Security
10:20 -
The Black Hat NOC: Greatest Hits and Holy...Cows
10:20 -
Win the 0-Day Racing Game Against Botnet in Public Cloud
10:20 -
Adversary Detection Pipelines: Finally Making Your Threat Intel Useful
11:20 -
Biometrics & Privacy: Time to Faceoff or is that FaceApp?
11:20 -
Patching Loopholes: Finding Backdoors in Applications
11:20 -
Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale
12:30 -
From an URGENT/11 Vulnerability to a Full Take-Down of a Factory, Using a Single Packet
12:30 -
Raiden Glitching Framework
12:30 -
Store-to-Leak Forwarding: There and Back Again
12:30 -
Escaping Virtualized Containers
13:30 -
Attacking and Defending Machine Learning Applications of Public Cloud
13:30 -
Misuse of DNS, the Second Most Used Protocol
13:30 -
Redback: Advanced Static Binary Injection
13:30 -
Hey Google, Activate Spyware! – When Google Assistant Uses a Vulnerability as a Feature
14:20 -
Kr00k: How KRACKing Amazon Echo Exposed a Billion+ Vulnerable Wi-Fi Devices
14:20 -
Back to the Future. Cross-Protocol Attacks in the Era of 5G
14:20 -
ZombieLoad: Leaking Data on Intel CPUs
14:20 -
May the Trust be with You: Empowering TrustZone-M with Multiple Trusted Environments
15:20 -
Locknote: Conclusions and Key Takeaways from Day 2
Presenters
Adam Laurie /
Major Malfunction
Andrea Continella
Anh Quynh Nguyen
Aravind Machiry
Ari Trachtenberg
Ashley Shen
Asuka Nakajima
Barak Hadad
Bart Stump
Ben Seri
Chad Spensky
Charles Perine
Chengbin Pang
Christopher Kruegel
Claudio Canella
Daniel Gruss
Daniel Oliveira
David Starobinski
Dirk-jan Mollema
Dor Zusman
Dou Goodman
Emilio Couto
Erez Yalon
Eric Koskinen
Erik Kraft
Gaurav Keerthi
Giovanni Vigna
Grzegorz Wypych
Haikuo Xie
Hao Xin
Hao Xing
Hui Yi Loke
Jian Weng
Jun Xu
Leigh-Anne Galloway
Lidia Giuliano
Lukas Giner
Lv Zhonghou
Max Chee
Melissa Wingard
Michael Kruger
Michael Schwarz
Mika Devonshire
Minh Tuan Do
Miriam Wiesner
Moritz Lipp
Neil R. Wyler /
Grifter
Nick Harper
Nilo Redini
Robert Lipovsky
Romain Thomas
Ruoyu Wang
Ryan Flores
Sandro Pinto
Sergey Puzankov
Seunghun Han
Seungjoo Kim
Shupeng Gao
Stefan Svorencik
Tim Yunusov
Trishita Tiwari
Ty Miller
Vandana Verma Sehgal
Wang Wenhua
Xena Olsen
Xiaokun Huang
Yan Shoshitaishvili /
Zardus
Yang Wang
Ye Zhang
Ying Wang
Yue Xu
Yue Zhang
Yuval Avrahami
Zhijian Shao