Black Hat USA 2016
took place July 30, 2016 through Aug. 4, 2016 (5 years, 9 months ago)
at Mandalay Bay in Las Vegas, Nevada, USA.
The general admission cost for the conference was $2,295.00[1].
Presentations:
Wednesday, Aug. 3, 2016
Thursday, Aug. 4, 2016
-
09:00 - Samsung Pay: Tokenized Numbers, Flaws and Issues
-
09:00 - BadTunnel: How Do I Get Big Brother Power?
-
09:00 - PINdemonium: A DBI-Based Generic Unpacker for Windows Executable
-
09:00 - Dark Side of the DNS Force
-
09:00 - A Lightbulb Worm?
-
09:00 - Blunting the Phisher's Spear: A Risk-Based Approach for Defining User Training and Awarding Administrative Privileges
-
09:00 - What's the DFIRence for ICS?
-
09:00 - Dungeons, Dragons and Security
-
09:00 - Keystone Engine: Next Generation Assembler Framework
-
09:45 - HTTP Cookie Hijacking in the Wild: Security and Privacy Implications
-
09:45 - Advanced CAN Injection Techniques for Vehicle Networks
-
09:45 - The Art of Defense - How Vulnerabilities Help Shape Security Features and Mitigations in Android
-
09:45 - The Remote Malicious Butler Did It!
-
09:45 - TCP Injection Attacks in the Wild - A Large Scale Study
-
09:45 - Ouroboros: Tearing Xen Hypervisor with the Snake
-
09:45 - Understanding HL7 2.x Standards, Pen Testing, and Defending HL7 2.x Messages
-
09:45 - Defense at Hyperscale: Technologies and Policies for a Defensible Cyberspace
-
09:45 - Windows 10 Segment Heap Internals
-
11:00 - O-checker: Detection of Malicious Documents Through Deviation from File Format Specifications
-
11:00 - Demystifying the Secure Enclave Processor
-
11:00 - Investigating DDOS - Architecture, Actors, and Attribution
-
11:00 - Next-Generation of Exploit Kit Detection by Building Simulated Obfuscators
-
11:00 - Analysis of the Attack Surface of Windows 10 Virtualization-Based Security
-
11:00 - Hacking Next-Gen ATMs: From Capture to Cashout
-
11:00 - Cunning with CNG: Soliciting Secrets from Schannel
-
11:00 - The Tao of Hardware, the Te of Implants
-
11:00 - Language Properties of Phone Scammers: Cyberdefense at the Level of the Human
-
12:10 - Discovering and Exploiting Novel Security Vulnerabilities in Apple ZeroConf
-
12:10 - AirBnBeware: Short Term Rentals, Long Term Pwnage
-
12:10 - SGX Secure Enclaves in Practice: Security and Crypto Review
-
12:10 - Horse Pill: A New Type of Linux Rootkit
-
12:10 - badWPAD
-
12:10 - When the Cops Come A-Knocking: Handling Technical Assistance Demands from Law Enforcement
-
12:10 - Hardening AWS Environments and Automating Incident Response for AWS Compromises
-
12:10 - Windows 10 Mitigation Improvements
-
12:10 - Weaponizing Data Science for Social Engineering: Automated E2E Spear Phishing on Twitter
-
14:30 - Bad for Enterprise: Attacking BYOD Enterprise Mobile Security Solutions
-
14:30 - Iran's Soft-War for Internet Dominance
-
14:30 - PLC-Blaster: A Worm Living Solely in the PLC
-
14:30 - VOIP WARS: The Phreakers Awaken
-
14:30 - Breaking FIDO: Are Exploits in There?
-
14:30 - Web Application Firewalls: Analysis of Detection Logic
-
14:30 - OSS Security Maturity: Time to Put On Your Big Boy Pants!
-
14:30 - Pangu 9 Internals
-
14:30 - The Year in Flash
-
15:50 - Using an Expanded Cyber Kill Chain Model to Increase Attack Resiliency
-
15:50 - Behind the Scenes of iOS Security
-
15:50 - The Art of Reverse Engineering Flash Exploits
-
15:50 - Crumbling the Supercookie, and Other Ways the FCC Protects Your Internet Traffic
-
15:50 - When Governments Attack: State Sponsored Malware Attacks Against Activists, Lawyers, and Journalists
-
15:50 - The Beast Within - Evading Dynamic Malware Analysis Using Microsoft COM
-
15:50 - DPTrace: Dual Purpose Trace for Exploitability Analysis of Program Crashes
-
15:50 - Timing Attacks Have Never Been So Practical: Advanced Cross-Site Search Attacks
-
15:50 - Breaking Hardware-Enforced Security with Hypervisors
-
17:00 - An Inconvenient Trust: User Attitudes Toward Security and Usability Tradeoffs for Key-Directory Encryption Systems
-
17:00 - Dangerous Hare: Hanging Attribute References Hazards Due to Vendor Customization
-
17:00 - Building Trust & Enabling Innovation for Voice Enabled IoT
-
17:00 - Over the Edge: Silently Owning Windows 10's Secure Browser
-
17:00 - Using Undocumented CPU Behavior to See into Kernel Mode and Break KASLR in the Process
-
17:00 - Attacking SDN Infrastructure: Are We Ready for the Next-Gen Networking?
-
17:00 - An AI Approach to Malware Similarity Analysis: Mapping the Malware Genome With a Deep Neural Network
-
17:00 - Call Me: Gathering Threat Intelligence on Telephony Scams to Detect Fraud
-
17:00 - Pay No Attention to That Hacker Behind the Curtain: A Look Inside the Black Hat Network
Presenters:
- ^ This price is meant to give a general idea of the cost of attending the conference. Many conferences have varying prices based on number of days of attendance, early registration, tiers of support, or additional costs for workshops or trainings. The price here is meant to represent the most common cost for the majority of attendees. See the conference's homepage, if applicable, for details.