Black Hat USA 2016
took place July 30, 2016 through Aug. 4, 2016 (7 years, 4 months ago)
at Mandalay Bay in Las Vegas, Nevada, USA.
The general admission cost for the conference was $2,295.00[1].
Presentations
Wednesday, Aug. 3, 2016
Thursday, Aug. 4, 2016
-
09:00 - Blunting the Phisher's Spear: A Risk-Based Approach for Defining User Training and Awarding Administrative Privileges
-
09:00 - Keystone Engine: Next Generation Assembler Framework
-
09:00 - Dark Side of the DNS Force
-
09:00 - Dungeons, Dragons and Security
-
09:00 - Samsung Pay: Tokenized Numbers, Flaws and Issues
-
09:00 - BadTunnel: How Do I Get Big Brother Power?
-
09:00 - PINdemonium: A DBI-Based Generic Unpacker for Windows Executable
-
09:00 - What's the DFIRence for ICS?
-
09:00 - A Lightbulb Worm?
-
09:45 - Understanding HL7 2.x Standards, Pen Testing, and Defending HL7 2.x Messages
-
09:45 - Advanced CAN Injection Techniques for Vehicle Networks
-
09:45 - Windows 10 Segment Heap Internals
-
09:45 - HTTP Cookie Hijacking in the Wild: Security and Privacy Implications
-
09:45 - Defense at Hyperscale: Technologies and Policies for a Defensible Cyberspace
-
09:45 - The Remote Malicious Butler Did It!
-
09:45 - Ouroboros: Tearing Xen Hypervisor with the Snake
-
09:45 - TCP Injection Attacks in the Wild - A Large Scale Study
-
09:45 - The Art of Defense - How Vulnerabilities Help Shape Security Features and Mitigations in Android
-
11:00 - Analysis of the Attack Surface of Windows 10 Virtualization-Based Security
-
11:00 - Hacking Next-Gen ATMs: From Capture to Cashout
-
11:00 - Demystifying the Secure Enclave Processor
-
11:00 - The Tao of Hardware, the Te of Implants
-
11:00 - Cunning with CNG: Soliciting Secrets from Schannel
-
11:00 - Investigating DDOS - Architecture, Actors, and Attribution
-
11:00 - Language Properties of Phone Scammers: Cyberdefense at the Level of the Human
-
11:00 - O-checker: Detection of Malicious Documents Through Deviation from File Format Specifications
-
11:00 - Next-Generation of Exploit Kit Detection by Building Simulated Obfuscators
-
12:10 - SGX Secure Enclaves in Practice: Security and Crypto Review
-
12:10 - Windows 10 Mitigation Improvements
-
12:10 - Horse Pill: A New Type of Linux Rootkit
-
12:10 - When the Cops Come A-Knocking: Handling Technical Assistance Demands from Law Enforcement
-
12:10 - Discovering and Exploiting Novel Security Vulnerabilities in Apple ZeroConf
-
12:10 - Weaponizing Data Science for Social Engineering: Automated E2E Spear Phishing on Twitter
-
12:10 - AirBnBeware: Short Term Rentals, Long Term Pwnage
-
12:10 - Hardening AWS Environments and Automating Incident Response for AWS Compromises
-
12:10 - badWPAD
-
14:30 - Web Application Firewalls: Analysis of Detection Logic
-
14:30 - VOIP WARS: The Phreakers Awaken
-
14:30 - Pangu 9 Internals
-
14:30 - OSS Security Maturity: Time to Put On Your Big Boy Pants!
-
14:30 - Breaking FIDO: Are Exploits in There?
-
14:30 - Iran's Soft-War for Internet Dominance
-
14:30 - PLC-Blaster: A Worm Living Solely in the PLC
-
14:30 - The Year in Flash
-
14:30 - Bad for Enterprise: Attacking BYOD Enterprise Mobile Security Solutions
-
15:50 - When Governments Attack: State Sponsored Malware Attacks Against Activists, Lawyers, and Journalists
-
15:50 - Using an Expanded Cyber Kill Chain Model to Increase Attack Resiliency
-
15:50 - Crumbling the Supercookie, and Other Ways the FCC Protects Your Internet Traffic
-
15:50 - Timing Attacks Have Never Been So Practical: Advanced Cross-Site Search Attacks
-
15:50 - The Beast Within - Evading Dynamic Malware Analysis Using Microsoft COM
-
15:50 - Breaking Hardware-Enforced Security with Hypervisors
-
15:50 - The Art of Reverse Engineering Flash Exploits
-
15:50 - DPTrace: Dual Purpose Trace for Exploitability Analysis of Program Crashes
-
15:50 - Behind the Scenes of iOS Security
-
17:00 - Attacking SDN Infrastructure: Are We Ready for the Next-Gen Networking?
-
17:00 - Using Undocumented CPU Behavior to See into Kernel Mode and Break KASLR in the Process
-
17:00 - Call Me: Gathering Threat Intelligence on Telephony Scams to Detect Fraud
-
17:00 - An Inconvenient Trust: User Attitudes Toward Security and Usability Tradeoffs for Key-Directory Encryption Systems
-
17:00 - Over the Edge: Silently Owning Windows 10's Secure Browser
-
17:00 - An AI Approach to Malware Similarity Analysis: Mapping the Malware Genome With a Deep Neural Network
-
17:00 - Dangerous Hare: Hanging Attribute References Hazards Due to Vendor Customization
-
17:00 - Pay No Attention to That Hacker Behind the Curtain: A Look Inside the Black Hat Network
-
17:00 - Building Trust & Enabling Innovation for Voice Enabled IoT
- ^ This price is meant to give a general idea of the cost of attending the conference. Many conferences have varying prices based on number of days of attendance, early registration, tiers of support, or additional costs for workshops or trainings. The price here is meant to represent the most common cost for the majority of attendees. See the conference's homepage, if applicable, for details.