Black Hat USA 2018
took place Aug. 4, 2018 through Aug. 9, 2018 (4 years, 7 months ago)
at Mandalay Bay in Las Vegas, Nevada, USA.
The general admission cost for the conference was $2,495.00[1].
Presentations
Wednesday, Aug. 8, 2018
Thursday, Aug. 9, 2018
-
09:00 - Stop that Release, There's a Vulnerability!
-
09:00 - Demystifying PTSD in the Cybersecurity Environment
-
09:00 - Two-Factor Authentication, Usable or Not? A Two-Phase Usability Study of the FIDO U2F Security Key
-
09:00 - The Problems and Promise of WebAssembly
-
09:00 - Fire & Ice: Making and Breaking macOS Firewalls
-
09:00 - Real Eyes, Realize, Real Lies: Beating Deception Technologies
-
09:00 - Lessons from Virginia - A Comparative Forensic Analysis of WinVote Voting Machines
-
09:00 - ARTist - A Novel Instrumentation Framework for Reversing and Analyzing Android Apps and the Middleware
-
09:00 - Money-rity Report: Using Intelligence to Predict the Next Payment Card Fraud Victims
-
09:45 - Identity Theft: Attacks on SSO Systems
-
09:45 - Reconstruct the World from Vanished Shadow: Recovering Deleted VSS Snapshots
-
09:45 - Black Box is Dead. Long Live Black Box!
-
09:45 - Kernel Mode Threats and Practical Defenses
-
09:45 - Snooping on Cellular Gateways and Their Critical Role in ICS
-
09:45 - The Science of Hiring and Retaining Female Cybersecurity Engineers
-
09:45 - The Windows Notification Facility: Peeling the Onion of the Most Undocumented Kernel Attack Surface Yet
-
09:45 - New Norms and Policies in Cyber-Diplomacy
-
09:45 - Your Voice is My Passport
-
11:00 - Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels
-
11:00 - Decompiler Internals: Microcode
-
11:00 - Stealth Mango and the Prevalence of Mobile Surveillanceware
-
11:00 - A Deep Dive into macOS MDM (and How it can be Compromised)
-
11:00 - Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform Capabilities
-
11:00 - AI & ML in Cyber Security - Why Algorithms are Dangerous
-
11:00 - Pestilential Protocol: How Unsecure HL7 Messages Threaten Patient Lives
-
11:00 - Are You Trading Stocks Securely? Exposing Security Flaws in Trading Technologies
-
11:00 - GOD MODE UNLOCKED - Hardware Backdoors in x86 CPUs
-
12:10 - WebAssembly: A New World of Native Exploits on the Browser
-
12:10 - Playback: A TLS 1.3 Story
-
12:10 - So I became a Domain Controller
-
12:10 - Applied Self-Driving Car Security
-
12:10 - TLBleed: When Protecting Your CPU Caches is Not Enough
-
12:10 - Outsmarting the Smart City
-
12:10 - Protecting the Protector, Hardening Machine Learning Defenses Against Adversarial Attacks
-
12:10 - None of My Pixel is Your Business: Active Watermarking Cancellation Against Video Streaming Service
-
12:10 - Wrangling with the Ghost: An Inside Story of Mitigating Speculative Execution Side Channel Vulnerabilities
-
14:30 - Automated Discovery of Deserialization Gadget Chains
-
14:30 - Exploitation of a Modern Smartphone Baseband
-
14:30 - From Thousands of Hours to a Couple of Minutes: Automating Exploit Generation for Arbitrary Types of Kernel Vulnerabilities
-
14:30 - Another Flip in the Row
-
14:30 - Catch me, Yes we can! – Pwning Social Engineers using Natural Language Processing Techniques in Real-Time
-
14:30 - How can Someone with Autism Specifically Enhance the Cyber Security Workforce?
-
14:30 - Legal Liability for IOT Cybersecurity Vulnerabilities
-
14:30 - Windows Offender: Reverse Engineering Windows Defender's Antivirus Emulator
-
14:30 - Last Call for SATCOM Security
-
15:50 - Hardening Hyper-V through Offensive Security Research
-
15:50 - SirenJack: Cracking a 'Secure' Emergency Warning Siren System
-
15:50 - Lowering the Bar: Deep Learning for Side Channel Analysis
-
15:50 - Understanding and Exploiting Implanted Medical Devices
-
15:50 - Mainframe [z/OS] Reverse Engineering and Exploit Development
-
15:50 - IoT Malware: Comprehensive Survey, Analysis Framework and Case Studies
-
15:50 - For the Love of Money: Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems
-
15:50 - SDL That Won't Break the Bank
-
15:50 - Practical Web Cache Poisoning: Redefining 'Unexploitable'
-
17:00 - Meltdown: Basics, Details, Consequences
-
17:00 - Return of Bleichenbacher's Oracle Threat (ROBOT)
-
17:00 - Unpacking the Packed Unpacker: Reverse Engineering an Android Anti-Analysis Native Library
-
17:00 - Lessons and Lulz: The 4th Annual Black Hat USA NOC Report
-
17:00 - It's a PHP Unserialization Vulnerability Jim, but Not as We Know It
-
17:00 - The Finest Penetration Testing Framework for Software-Defined Networks
-
17:00 - Follow the White Rabbit: Simplifying Fuzz Testing Using FuzzExMachina
-
17:00 - Over-the-Air: How we Remotely Compromised the Gateway, BCM, and Autopilot ECUs of Tesla Cars
-
17:00 - DeepLocker - Concealing Targeted Attacks with AI Locksmithing
- ^ This price is meant to give a general idea of the cost of attending the conference. Many conferences have varying prices based on number of days of attendance, early registration, tiers of support, or additional costs for workshops or trainings. The price here is meant to represent the most common cost for the majority of attendees. See the conference's homepage, if applicable, for details.