Black Hat USA 2016
took place July 30, 2016 through Aug. 4, 2016 (6 years, 6 months ago)
at Mandalay Bay in Las Vegas, Nevada, USA.
The general admission cost for the conference was $2,295.00[1].
Presentations
Wednesday, Aug. 3, 2016
Thursday, Aug. 4, 2016
-
09:00 - A Lightbulb Worm?
-
09:00 - Dark Side of the DNS Force
-
09:00 - PINdemonium: A DBI-Based Generic Unpacker for Windows Executable
-
09:00 - Keystone Engine: Next Generation Assembler Framework
-
09:00 - Dungeons, Dragons and Security
-
09:00 - Samsung Pay: Tokenized Numbers, Flaws and Issues
-
09:00 - Blunting the Phisher's Spear: A Risk-Based Approach for Defining User Training and Awarding Administrative Privileges
-
09:00 - BadTunnel: How Do I Get Big Brother Power?
-
09:00 - What's the DFIRence for ICS?
-
09:45 - Ouroboros: Tearing Xen Hypervisor with the Snake
-
09:45 - Advanced CAN Injection Techniques for Vehicle Networks
-
09:45 - The Art of Defense - How Vulnerabilities Help Shape Security Features and Mitigations in Android
-
09:45 - Windows 10 Segment Heap Internals
-
09:45 - HTTP Cookie Hijacking in the Wild: Security and Privacy Implications
-
09:45 - TCP Injection Attacks in the Wild - A Large Scale Study
-
09:45 - The Remote Malicious Butler Did It!
-
09:45 - Understanding HL7 2.x Standards, Pen Testing, and Defending HL7 2.x Messages
-
09:45 - Defense at Hyperscale: Technologies and Policies for a Defensible Cyberspace
-
11:00 - Cunning with CNG: Soliciting Secrets from Schannel
-
11:00 - Next-Generation of Exploit Kit Detection by Building Simulated Obfuscators
-
11:00 - Hacking Next-Gen ATMs: From Capture to Cashout
-
11:00 - Demystifying the Secure Enclave Processor
-
11:00 - The Tao of Hardware, the Te of Implants
-
11:00 - Analysis of the Attack Surface of Windows 10 Virtualization-Based Security
-
11:00 - Language Properties of Phone Scammers: Cyberdefense at the Level of the Human
-
11:00 - O-checker: Detection of Malicious Documents Through Deviation from File Format Specifications
-
11:00 - Investigating DDOS - Architecture, Actors, and Attribution
-
12:10 - Hardening AWS Environments and Automating Incident Response for AWS Compromises
-
12:10 - AirBnBeware: Short Term Rentals, Long Term Pwnage
-
12:10 - SGX Secure Enclaves in Practice: Security and Crypto Review
-
12:10 - Discovering and Exploiting Novel Security Vulnerabilities in Apple ZeroConf
-
12:10 - badWPAD
-
12:10 - Horse Pill: A New Type of Linux Rootkit
-
12:10 - When the Cops Come A-Knocking: Handling Technical Assistance Demands from Law Enforcement
-
12:10 - Windows 10 Mitigation Improvements
-
12:10 - Weaponizing Data Science for Social Engineering: Automated E2E Spear Phishing on Twitter
-
14:30 - VOIP WARS: The Phreakers Awaken
-
14:30 - Web Application Firewalls: Analysis of Detection Logic
-
14:30 - Iran's Soft-War for Internet Dominance
-
14:30 - PLC-Blaster: A Worm Living Solely in the PLC
-
14:30 - The Year in Flash
-
14:30 - Breaking FIDO: Are Exploits in There?
-
14:30 - OSS Security Maturity: Time to Put On Your Big Boy Pants!
-
14:30 - Pangu 9 Internals
-
14:30 - Bad for Enterprise: Attacking BYOD Enterprise Mobile Security Solutions
-
15:50 - Using an Expanded Cyber Kill Chain Model to Increase Attack Resiliency
-
15:50 - The Art of Reverse Engineering Flash Exploits
-
15:50 - When Governments Attack: State Sponsored Malware Attacks Against Activists, Lawyers, and Journalists
-
15:50 - Crumbling the Supercookie, and Other Ways the FCC Protects Your Internet Traffic
-
15:50 - The Beast Within - Evading Dynamic Malware Analysis Using Microsoft COM
-
15:50 - DPTrace: Dual Purpose Trace for Exploitability Analysis of Program Crashes
-
15:50 - Timing Attacks Have Never Been So Practical: Advanced Cross-Site Search Attacks
-
15:50 - Breaking Hardware-Enforced Security with Hypervisors
-
15:50 - Behind the Scenes of iOS Security
-
17:00 - Call Me: Gathering Threat Intelligence on Telephony Scams to Detect Fraud
-
17:00 - Dangerous Hare: Hanging Attribute References Hazards Due to Vendor Customization
-
17:00 - Over the Edge: Silently Owning Windows 10's Secure Browser
-
17:00 - Using Undocumented CPU Behavior to See into Kernel Mode and Break KASLR in the Process
-
17:00 - An Inconvenient Trust: User Attitudes Toward Security and Usability Tradeoffs for Key-Directory Encryption Systems
-
17:00 - Pay No Attention to That Hacker Behind the Curtain: A Look Inside the Black Hat Network
-
17:00 - An AI Approach to Malware Similarity Analysis: Mapping the Malware Genome With a Deep Neural Network
-
17:00 - Building Trust & Enabling Innovation for Voice Enabled IoT
-
17:00 - Attacking SDN Infrastructure: Are We Ready for the Next-Gen Networking?
- ^ This price is meant to give a general idea of the cost of attending the conference. Many conferences have varying prices based on number of days of attendance, early registration, tiers of support, or additional costs for workshops or trainings. The price here is meant to represent the most common cost for the majority of attendees. See the conference's homepage, if applicable, for details.