InfoconDB
Toggle navigation
Support
About
InfoconDB
Black Hat
Black Hat Europe 2020
Black Hat Europe 2020
Virtual
Black Hat Europe 2020
took place Dec. 7, 2020 through Dec. 10, 2020 (3 years, 11 months ago).
https://www.blackhat.com/eu-20/
https://infocon.org/cons/Black Hat/Black Hat Europe/Black Hat Europe 2020/
Presentations
Wednesday, Dec. 9, 2020
09:00 -
Hacking Government Cybersecurity
10:20 -
It's not FINished: The Evolving Maturity in Ransomware Operations
10:20 -
Jack-in-the-Cache: A New Code injection Technique through Modifying X86-to-ARM Translation Cache
10:20 -
Finding Bugs Compiler Knows but Doesn't Tell You: Dissecting Undefined Behavior Optimizations in LLVM
10:20 -
Shield with Hole: New Security Mitigation Helps Us Escape Chrome Sandbox to Exfiltrate User Privacy
11:20 -
A New Hope: The One Last Chance to Save Your SSD Data
11:20 -
The Subtle Art of Chaining Headers - IKEv2 Attack Surface Case Study
11:20 -
Graph Convolutional Network-Based Suspicious Communication Pair Estimation for Industrial Control Systems
12:30 -
From Zero to Sixty: The Story of North Korea's Rapid Ascent to Becoming a Global Cyber Superpower
12:30 -
Debug Resurrection on Nordic nRF52 Series
12:30 -
LadderLeak: Breaking ECDSA with Less than One Bit of Nonce Leakage
13:30 -
Discovering 20 Year Old Vulnerabilities in Modern Windows Kernel
13:30 -
FPs are Cheap. Show me the CVEs!
13:30 -
Design Pitfalls in Commercial Mini-Programs on Android and iOS
13:30 -
Manufacturing Hardware Implants from Idea to Mass Production: A Hacker's Journey
14:20 -
efiXplorer: Hunting for UEFI Firmware Vulnerabilities at Scale with Automated Static Analysis
14:20 -
Hermes Attack: Steal DNN Models In AI Privatization Deployment Scenarios
14:20 -
IAM Concerned: OAuth Token Hijacking in Google Cloud (GCP)
14:20 -
How Embedded TCP/IP Stacks Breed Critical Vulnerabilities
15:20 -
Locknote: Conclusions and Key Takeaways from Day 1
Thursday, Dec. 10, 2020
09:00 -
Precursor: Towards Evidence-Based Trust in Hardware
10:20 -
Fingerprint-Jacking: Practical Fingerprint Authorization Hijacking in Android Apps
10:20 -
This is for the Pwners : Exploiting a WebKit 0-day in PlayStation 4
10:20 -
Bypassing NGAV for Fun and Profit
10:20 -
BinTyper: Type Confusion Detection for C++ Binaries
11:20 -
My Ticks Don't Lie: New Timing Attacks for Hypervisor Detection
11:20 -
POSWorld. Should You be Afraid of Hands-On Payment Devices?
11:20 -
Effective Vulnerability Discovery with Machine Learning
12:30 -
The Hunt for Major League IoT-ICS Threats: A Deep Dive into IoT Threat Terrain
12:30 -
Portable Data exFiltration: XSS for PDFs
12:30 -
Quantum Security and Cryptography: You Are (Probably) Doing it Wrong
13:30 -
Cross-Site Escape: Pwning macOS Safari Sandbox the Unusual Way
13:30 -
How to Better Fuzz Windows 10 Directx Kernel at Present
13:30 -
Circumventing the Guardians: How the Security Features in State-of-the-Art TLS Inspection Solutions can be Exploited for Covert Data Exfiltration
14:20 -
Light Commands: Hacking Voice Assistants with Lasers
14:20 -
Story of Jailbreaking iOS 13
14:20 -
Permission Mining in GCP
14:20 -
Please Make a Dentist Appointment ASAP: Attacking IOBluetoothFamily HCI and Vendor-Specific Commands
15:20 -
Locknote: Conclusions and Key Takeaways from Day 2
Presenters
Akira Takahashi
Aleksei Stennikov
Alex Matrosov
Amine Amri
Andrew Huang
Andrey Labunets
Antonios Atlasis
Asankhaya Sharma
Bas van Schaik
Benjamin Cyr
Colin Estep
Daniel Cuthbert
Daniel Genkin
Daniel dos Santos
Daniele Cono D'Elia
Diego De Freitas Aranha
Dongju Kim
Elisabeth Oswald
Federico Maggi
Gareth Heyes
Haibin Shi
Hanjun Chung
Haoran Lu
Hiromitsu Oshiba
Husheng Zhou
Ishai Rosenberg
James Kettle /
albinowax
Jason Rivera
Jenko Hwong
Jos Wetzels
Josh Burgess
Kai Song
Kevin Backhouse
Ko Nakagawa
Kwonyoup Kim
Leigh-Anne Galloway
Limited Results
Luca Bongiorni
Luyi Xing
Marina Krotofil
Mars Cheng
Matteo Malvica
Mehdi Talbi
Ming Yi Ang
Mingyue Liang
Mitchell Clarke
Morten Marstrander
Patrick Kuo
Pete Cooper
Philip Lebedev
Quentin Meffre
Rancho Han
Ronghai Yang
Sara Rampazzi
Seungjoo Kim
Seungjoon Lee
Shai Meir
Shangcheng Shi
Sharon Conheady
Stanislav Dashevskyi
Taehyun Kim
Taewon Kim
Tatsumi Oba
Thomas Brandstetter
Timur Yunusov
Tom Hall
Tommaso Gagliardoni
Wei Liu
Wing Cheong Lau
Xianbo Wang
Xiaojing Liao
Xiaoliang Liu
Yegor Vasilenko
Yikang Chen
Yongke Wang
Yu Wang
Yuankun Zhu
Yueqiang Cheng
Zekai Wu
Zhi Zhou
08Tc3wBB