InfoconDB
Toggle navigation
Support
About
InfoconDB
Black Hat
Black Hat Asia 2021
Black Hat Asia 2021
Virtual
Black Hat Asia 2021
took place May 4, 2021 through May 7, 2021 (3 years, 6 months ago).
https://www.blackhat.com/asia-21/
Presentations
Thursday, May 6, 2021
09:00 -
Lessons From 11 Billion Breached Records
10:20 -
Racing the Dark: A New TOCTTOU Story From Apple's Core
10:20 -
A Walk Through Historical Correlations Between Vulnerabilities & Stock Prices
10:20 -
Pre-built JOP Chains with the JOP ROCKET: Bypassing DEP without ROP
10:20 -
Disappeared Coins: Steal Hashrate in Stratum Secretly
11:20 -
Vibe Check: IDK About This…. Why Students May Shy Away From Cyber in a Surveillance State
11:20 -
Mining and Exploiting (Mobile) Payment Credential Leaks in the Wild
11:20 -
Give Me a SQL Injection, I Shall PWN IIS and SQL Server
11:20 -
The Rise of Potatoes: Privilege Escalations in Windows Services
12:30 -
Stuxnet-in-a-Box: In-Field Emulation and Fuzzing of PLCs to Uncover the Next Zero-Day Threat in Industrial Control Systems
12:30 -
The Cost of Complexity: Different Vulnerabilities While Implementing the Same RFC
12:30 -
Domain Borrowing: Catch My C2 Traffic if You Can
12:30 -
Threat Hunting in Active Directory Environment
13:30 -
How Did the Adversaries Abusing the Bitcoin Blockchain Evade Our Takeover?
13:30 -
Wideshears: Investigating and Breaking Widevine on QTEE
13:30 -
(Un)protected Broadcasts in Android 9 and 10
14:20 -
X-in-the-Middle: Attacking Fast Charging Piles and Electric Vehicles
14:20 -
Enter Sandbox
14:20 -
Alarm.DISARM - Remotely Exploiting and Disarming Popular Physical Security System from Public Internet
14:20 -
Hunting Vulnerabilities of gRPC Protocol Armed Mobile/IoT Applications
15:20 -
Locknote: Conclusions and Key Takeaways from Day 1
Friday, May 7, 2021
09:00 -
Insights and Predictions: What's Next in InfoSec
10:20 -
Apple Neural Engine Internal: From ML Algorithm to HW Registers
10:20 -
How I Can Unlock Your Smart Door: Security Pitfalls in Cross-Vendor IoT Access Control
10:20 -
Anti-Forensics: Reverse Engineering a Leading Phone Forensic Tool
10:20 -
A General Approach to Bypassing Many Kernel Protections and its Mitigation
11:20 -
Scavenger: Misuse Error Handling Leading to Qemu/KVM Escape
11:20 -
"We Are About to Land": How CloudDragon Turns a Nightmare Into Reality
11:20 -
A New Era of One-Click Attacks: How to Break Install-Less Apps
11:20 -
New Attack Surface in Safari: Using Just One Web Audio Vulnerability to Rule Safari
12:30 -
Hiding Objects from Computer Vision by Exploiting Correlation Biases
12:30 -
The Price of Compatibility: Defeating macOS Kernel Using Extended File Attributes
12:30 -
In-Depth Analyzing and Fuzzing for Qualcomm Hexagon Processor
13:30 -
Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network
13:30 -
The Tangled Webview ----- Javascriptinterface Once More
13:30 -
A Mirage of Safety: Bug Finding and Exploit Techniques of Top Android Vendor's Privacy Protection Apps
13:30 -
The B-MAD Approach to Threat Modeling
14:20 -
The Motion Sensor Western: The Good (Automatic Functionality Support), the Bad (Security Risks to Devices), and the Ugly (Privacy Risks to Individuals)
14:20 -
Hey, You, Get off My Private Data: Do Apps Respect Your Privacy as They Claim?
14:20 -
Reverse Engineering Compliance
Presenters
Adam Shostack
Alejandro Hernández
Angelos Stavrou
Antonio Cocomazzi
Anurag Khanna
Aragorn Tseng
Austin Babcock
Ben Nassi
Bin Yuan
Bo Liu
Bo Qu
Bo Zhang
Bramwell Brizendine
Ce Qin
Charles Li
Christian Doerr
Chunming Wu
Claudio Canella
Daniel dos Santos
Dimitrios Tychalas
Dongfang Zhao
Fyodor Yarochkin
Gaoning Pan
Guangdong Bai
Hao Zhao
Huiming Liu
Jeff Wilson
Jhih-Lin Kuo
Jiashui Wang
JunDong Xie
Junyu Zhou
Lidia Giuliano
Luyi Xing
Mario Werner
Masaki Kamizono
Matt Bergin
Michael Schwarz
Michail Maniatakos
Mika Devonshire
Mohamed Elsabagh
Neil R. Wyler /
Grifter
Omri Ben-Bassat
Pamela O'Shea
Paul Ziegler
Qi Deng
Qi Zhao
Qing Zhang
Qingguo Zhou
Rui Chong
Ryan Johnson
Shangcheng Shi
Shijie Cao
Shlomi Oberman
Tao Yan
Thirumalai Natarajan Muthiah
Tianze Ding
Troy Hunt
Tsuyoshi Taniguchi
Ty Miller
Vandana Verma
Vitaly Kamluk
Wing Cheong Lau
Wish Wu
Wu HuiYu
Xianbo Wang
Xiangqian Zhang
Xiling Gong
Xin Liu
Xingwei Lin
Xinlei Ying
Xinyu Xing
Yan Jia
Yimin Wu
Yin Minn Pa Pa
Yingli Zhang
Yu Wang
YuXiang Li
Yuanyuan Huang
Yueqi Chen
Zhenpeng Lin
Zhiyang Zeng
Zih-Cing Liao
Zuozhi Fan