Black Hat USA 2016
took place July 30, 2016 through Aug. 4, 2016 (8 years, 3 months ago) at Mandalay Bay in Las Vegas, Nevada, USA.
The general admission cost for the conference was $2,295.00[1].
Presentations
Wednesday, Aug. 3, 2016
Thursday, Aug. 4, 2016
-
09:00 - PINdemonium: A DBI-Based Generic Unpacker for Windows Executable
-
09:00 - Dark Side of the DNS Force
-
09:00 - Dungeons, Dragons and Security
-
09:00 - BadTunnel: How Do I Get Big Brother Power?
-
09:00 - What's the DFIRence for ICS?
-
09:00 - Blunting the Phisher's Spear: A Risk-Based Approach for Defining User Training and Awarding Administrative Privileges
-
09:00 - Samsung Pay: Tokenized Numbers, Flaws and Issues
-
09:00 - A Lightbulb Worm?
-
09:00 - Keystone Engine: Next Generation Assembler Framework
-
09:45 - Understanding HL7 2.x Standards, Pen Testing, and Defending HL7 2.x Messages
-
09:45 - The Remote Malicious Butler Did It!
-
09:45 - Windows 10 Segment Heap Internals
-
09:45 - HTTP Cookie Hijacking in the Wild: Security and Privacy Implications
-
09:45 - Defense at Hyperscale: Technologies and Policies for a Defensible Cyberspace
-
09:45 - Ouroboros: Tearing Xen Hypervisor with the Snake
-
09:45 - The Art of Defense - How Vulnerabilities Help Shape Security Features and Mitigations in Android
-
09:45 - TCP Injection Attacks in the Wild - A Large Scale Study
-
09:45 - Advanced CAN Injection Techniques for Vehicle Networks
-
11:00 - Analysis of the Attack Surface of Windows 10 Virtualization-Based Security
-
11:00 - Demystifying the Secure Enclave Processor
-
11:00 - Investigating DDOS - Architecture, Actors, and Attribution
-
11:00 - Language Properties of Phone Scammers: Cyberdefense at the Level of the Human
-
11:00 - O-checker: Detection of Malicious Documents Through Deviation from File Format Specifications
-
11:00 - The Tao of Hardware, the Te of Implants
-
11:00 - Cunning with CNG: Soliciting Secrets from Schannel
-
11:00 - Hacking Next-Gen ATMs: From Capture to Cashout
-
11:00 - Next-Generation of Exploit Kit Detection by Building Simulated Obfuscators
-
12:10 - Discovering and Exploiting Novel Security Vulnerabilities in Apple ZeroConf
-
12:10 - Horse Pill: A New Type of Linux Rootkit
-
12:10 - Windows 10 Mitigation Improvements
-
12:10 - Hardening AWS Environments and Automating Incident Response for AWS Compromises
-
12:10 - AirBnBeware: Short Term Rentals, Long Term Pwnage
-
12:10 - Weaponizing Data Science for Social Engineering: Automated E2E Spear Phishing on Twitter
-
12:10 - SGX Secure Enclaves in Practice: Security and Crypto Review
-
12:10 - When the Cops Come A-Knocking: Handling Technical Assistance Demands from Law Enforcement
-
12:10 - badWPAD
-
14:30 - The Year in Flash
-
14:30 - Bad for Enterprise: Attacking BYOD Enterprise Mobile Security Solutions
-
14:30 - OSS Security Maturity: Time to Put On Your Big Boy Pants!
-
14:30 - PLC-Blaster: A Worm Living Solely in the PLC
-
14:30 - VOIP WARS: The Phreakers Awaken
-
14:30 - Pangu 9 Internals
-
14:30 - Iran's Soft-War for Internet Dominance
-
14:30 - Breaking FIDO: Are Exploits in There?
-
14:30 - Web Application Firewalls: Analysis of Detection Logic
-
15:50 - The Beast Within - Evading Dynamic Malware Analysis Using Microsoft COM
-
15:50 - Crumbling the Supercookie, and Other Ways the FCC Protects Your Internet Traffic
-
15:50 - Breaking Hardware-Enforced Security with Hypervisors
-
15:50 - When Governments Attack: State Sponsored Malware Attacks Against Activists, Lawyers, and Journalists
-
15:50 - Using an Expanded Cyber Kill Chain Model to Increase Attack Resiliency
-
15:50 - Timing Attacks Have Never Been So Practical: Advanced Cross-Site Search Attacks
-
15:50 - The Art of Reverse Engineering Flash Exploits
-
15:50 - DPTrace: Dual Purpose Trace for Exploitability Analysis of Program Crashes
-
15:50 - Behind the Scenes of iOS Security
-
17:00 - An AI Approach to Malware Similarity Analysis: Mapping the Malware Genome With a Deep Neural Network
-
17:00 - Dangerous Hare: Hanging Attribute References Hazards Due to Vendor Customization
-
17:00 - Over the Edge: Silently Owning Windows 10's Secure Browser
-
17:00 - Attacking SDN Infrastructure: Are We Ready for the Next-Gen Networking?
-
17:00 - Using Undocumented CPU Behavior to See into Kernel Mode and Break KASLR in the Process
-
17:00 - An Inconvenient Trust: User Attitudes Toward Security and Usability Tradeoffs for Key-Directory Encryption Systems
-
17:00 - Call Me: Gathering Threat Intelligence on Telephony Scams to Detect Fraud
-
17:00 - Pay No Attention to That Hacker Behind the Curtain: A Look Inside the Black Hat Network
-
17:00 - Building Trust & Enabling Innovation for Voice Enabled IoT
- ^ This price is meant to give a general idea of the cost of attending the conference. Many conferences have varying prices based on number of days of attendance, early registration, tiers of support, or additional costs for workshops or trainings. The price here is meant to represent the most common cost for the majority of attendees. See the conference's homepage, if applicable, for details.