Black Hat USA 2018
took place Aug. 4, 2018 through Aug. 9, 2018 (6 years, 4 months ago) at Mandalay Bay in Las Vegas, Nevada, USA.
The general admission cost for the conference was $2,495.00[1].
Presentations
Wednesday, Aug. 8, 2018
Thursday, Aug. 9, 2018
-
09:00 - Stop that Release, There's a Vulnerability!
-
09:00 - Fire & Ice: Making and Breaking macOS Firewalls
-
09:00 - The Problems and Promise of WebAssembly
-
09:00 - Demystifying PTSD in the Cybersecurity Environment
-
09:00 - Two-Factor Authentication, Usable or Not? A Two-Phase Usability Study of the FIDO U2F Security Key
-
09:00 - Money-rity Report: Using Intelligence to Predict the Next Payment Card Fraud Victims
-
09:00 - ARTist - A Novel Instrumentation Framework for Reversing and Analyzing Android Apps and the Middleware
-
09:00 - Real Eyes, Realize, Real Lies: Beating Deception Technologies
-
09:00 - Lessons from Virginia - A Comparative Forensic Analysis of WinVote Voting Machines
-
09:45 - Your Voice is My Passport
-
09:45 - Snooping on Cellular Gateways and Their Critical Role in ICS
-
09:45 - The Windows Notification Facility: Peeling the Onion of the Most Undocumented Kernel Attack Surface Yet
-
09:45 - Identity Theft: Attacks on SSO Systems
-
09:45 - The Science of Hiring and Retaining Female Cybersecurity Engineers
-
09:45 - New Norms and Policies in Cyber-Diplomacy
-
09:45 - Reconstruct the World from Vanished Shadow: Recovering Deleted VSS Snapshots
-
09:45 - Kernel Mode Threats and Practical Defenses
-
09:45 - Black Box is Dead. Long Live Black Box!
-
11:00 - Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels
-
11:00 - AI & ML in Cyber Security - Why Algorithms are Dangerous
-
11:00 - GOD MODE UNLOCKED - Hardware Backdoors in x86 CPUs
-
11:00 - Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform Capabilities
-
11:00 - A Deep Dive into macOS MDM (and How it can be Compromised)
-
11:00 - Pestilential Protocol: How Unsecure HL7 Messages Threaten Patient Lives
-
11:00 - Stealth Mango and the Prevalence of Mobile Surveillanceware
-
11:00 - Are You Trading Stocks Securely? Exposing Security Flaws in Trading Technologies
-
11:00 - Decompiler Internals: Microcode
-
12:10 - WebAssembly: A New World of Native Exploits on the Browser
-
12:10 - So I became a Domain Controller
-
12:10 - Playback: A TLS 1.3 Story
-
12:10 - Applied Self-Driving Car Security
-
12:10 - TLBleed: When Protecting Your CPU Caches is Not Enough
-
12:10 - Outsmarting the Smart City
-
12:10 - Protecting the Protector, Hardening Machine Learning Defenses Against Adversarial Attacks
-
12:10 - None of My Pixel is Your Business: Active Watermarking Cancellation Against Video Streaming Service
-
12:10 - Wrangling with the Ghost: An Inside Story of Mitigating Speculative Execution Side Channel Vulnerabilities
-
14:30 - Automated Discovery of Deserialization Gadget Chains
-
14:30 - Exploitation of a Modern Smartphone Baseband
-
14:30 - From Thousands of Hours to a Couple of Minutes: Automating Exploit Generation for Arbitrary Types of Kernel Vulnerabilities
-
14:30 - Another Flip in the Row
-
14:30 - Catch me, Yes we can! – Pwning Social Engineers using Natural Language Processing Techniques in Real-Time
-
14:30 - How can Someone with Autism Specifically Enhance the Cyber Security Workforce?
-
14:30 - Legal Liability for IOT Cybersecurity Vulnerabilities
-
14:30 - Windows Offender: Reverse Engineering Windows Defender's Antivirus Emulator
-
14:30 - Last Call for SATCOM Security
-
15:50 - Hardening Hyper-V through Offensive Security Research
-
15:50 - For the Love of Money: Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems
-
15:50 - Lowering the Bar: Deep Learning for Side Channel Analysis
-
15:50 - Understanding and Exploiting Implanted Medical Devices
-
15:50 - Mainframe [z/OS] Reverse Engineering and Exploit Development
-
15:50 - IoT Malware: Comprehensive Survey, Analysis Framework and Case Studies
-
15:50 - SirenJack: Cracking a 'Secure' Emergency Warning Siren System
-
15:50 - SDL That Won't Break the Bank
-
15:50 - Practical Web Cache Poisoning: Redefining 'Unexploitable'
-
17:00 - Meltdown: Basics, Details, Consequences
-
17:00 - Lessons and Lulz: The 4th Annual Black Hat USA NOC Report
-
17:00 - Return of Bleichenbacher's Oracle Threat (ROBOT)
-
17:00 - Unpacking the Packed Unpacker: Reverse Engineering an Android Anti-Analysis Native Library
-
17:00 - It's a PHP Unserialization Vulnerability Jim, but Not as We Know It
-
17:00 - The Finest Penetration Testing Framework for Software-Defined Networks
-
17:00 - Follow the White Rabbit: Simplifying Fuzz Testing Using FuzzExMachina
-
17:00 - Over-the-Air: How we Remotely Compromised the Gateway, BCM, and Autopilot ECUs of Tesla Cars
-
17:00 - DeepLocker - Concealing Targeted Attacks with AI Locksmithing
- ^ This price is meant to give a general idea of the cost of attending the conference. Many conferences have varying prices based on number of days of attendance, early registration, tiers of support, or additional costs for workshops or trainings. The price here is meant to represent the most common cost for the majority of attendees. See the conference's homepage, if applicable, for details.