InfoconDB
Toggle navigation
About
InfoconDB
Black Hat
Black Hat Europe 2020
Black Hat Europe 2020
Virtual
Black Hat Europe 2020
took place Dec. 7, 2020 through Dec. 10, 2020 (2 years, 3 months ago) .
https://www.blackhat.com/eu-20/
Presentations
Wednesday, Dec. 9, 2020
09:00 -
Hacking Government Cybersecurity
10:20 -
Finding Bugs Compiler Knows but Doesn't Tell You: Dissecting Undefined Behavior Optimizations in LLVM
10:20 -
Jack-in-the-Cache: A New Code injection Technique through Modifying X86-to-ARM Translation Cache
10:20 -
Shield with Hole: New Security Mitigation Helps Us Escape Chrome Sandbox to Exfiltrate User Privacy
10:20 -
It's not FINished: The Evolving Maturity in Ransomware Operations
11:20 -
The Subtle Art of Chaining Headers - IKEv2 Attack Surface Case Study
11:20 -
Graph Convolutional Network-Based Suspicious Communication Pair Estimation for Industrial Control Systems
11:20 -
A New Hope: The One Last Chance to Save Your SSD Data
12:30 -
From Zero to Sixty: The Story of North Korea's Rapid Ascent to Becoming a Global Cyber Superpower
12:30 -
Debug Resurrection on Nordic nRF52 Series
12:30 -
LadderLeak: Breaking ECDSA with Less than One Bit of Nonce Leakage
13:30 -
FPs are Cheap. Show me the CVEs!
13:30 -
Discovering 20 Year Old Vulnerabilities in Modern Windows Kernel
13:30 -
Manufacturing Hardware Implants from Idea to Mass Production: A Hacker's Journey
13:30 -
Design Pitfalls in Commercial Mini-Programs on Android and iOS
14:20 -
Hermes Attack: Steal DNN Models In AI Privatization Deployment Scenarios
14:20 -
How Embedded TCP/IP Stacks Breed Critical Vulnerabilities
14:20 -
IAM Concerned: OAuth Token Hijacking in Google Cloud (GCP)
14:20 -
efiXplorer: Hunting for UEFI Firmware Vulnerabilities at Scale with Automated Static Analysis
15:20 -
Locknote: Conclusions and Key Takeaways from Day 1
Thursday, Dec. 10, 2020
09:00 -
Precursor: Towards Evidence-Based Trust in Hardware
10:20 -
Fingerprint-Jacking: Practical Fingerprint Authorization Hijacking in Android Apps
10:20 -
BinTyper: Type Confusion Detection for C++ Binaries
10:20 -
Bypassing NGAV for Fun and Profit
10:20 -
This is for the Pwners : Exploiting a WebKit 0-day in PlayStation 4
11:20 -
Effective Vulnerability Discovery with Machine Learning
11:20 -
My Ticks Don't Lie: New Timing Attacks for Hypervisor Detection
11:20 -
POSWorld. Should You be Afraid of Hands-On Payment Devices?
12:30 -
The Hunt for Major League IoT-ICS Threats: A Deep Dive into IoT Threat Terrain
12:30 -
Quantum Security and Cryptography: You Are (Probably) Doing it Wrong
12:30 -
Portable Data exFiltration: XSS for PDFs
13:30 -
Cross-Site Escape: Pwning macOS Safari Sandbox the Unusual Way
13:30 -
Circumventing the Guardians: How the Security Features in State-of-the-Art TLS Inspection Solutions can be Exploited for Covert Data Exfiltration
13:30 -
How to Better Fuzz Windows 10 Directx Kernel at Present
14:20 -
Permission Mining in GCP
14:20 -
Light Commands: Hacking Voice Assistants with Lasers
14:20 -
Story of Jailbreaking iOS 13
14:20 -
Please Make a Dentist Appointment ASAP: Attacking IOBluetoothFamily HCI and Vendor-Specific Commands
15:20 -
Locknote: Conclusions and Key Takeaways from Day 2
Presenters
Akira Takahashi
Aleksei Stennikov
Alex Matrosov
Amine Amri
Andrew Huang
Andrey Labunets
Antonios Atlasis
Asankhaya Sharma
Bas van Schaik
Benjamin Cyr
Colin Estep
Daniel Cuthbert
Daniel dos Santos
Daniele Cono D'Elia
Daniel Genkin
Diego De Freitas Aranha
Dongju Kim
Elisabeth Oswald
Federico Maggi
Gareth Heyes
Haibin Shi
Hanjun Chung
Haoran Lu
Hiromitsu Oshiba
Husheng Zhou
Ishai Rosenberg
James Kettle /
albinowax
Jason Rivera
Jenko Hwong
Josh Burgess
Jos Wetzels
Kai Song
Kevin Backhouse
Ko Nakagawa
Kwonyoup Kim
Leigh-Anne Galloway
Limited Results
Luca Bongiorni
Luyi Xing
Marina Krotofil
Mars Cheng
Matteo Malvica
Mehdi Talbi
Ming Yi Ang
Mingyue Liang
Mitchell Clarke
Morten Marstrander
Patrick Kuo
Pete Cooper
Philip Lebedev
Quentin Meffre
Rancho Han
Ronghai Yang
Sara Rampazzi
Seungjoo Kim
Seungjoon Lee
Shai Meir
Shangcheng Shi
Sharon Conheady
Stanislav Dashevskyi
Taehyun Kim
Taewon Kim
Tatsumi Oba
Thomas Brandstetter
Timur Yunusov
Tom Hall
Tommaso Gagliardoni
Wei Liu
Wing Cheong Lau
Xianbo Wang
Xiaojing Liao
Xiaoliang Liu
Yegor Vasilenko
Yikang Chen
Yongke Wang
Yuankun Zhu
Yueqiang Cheng
Yu Wang
Zekai Wu
Zhi Zhou
08Tc3wBB