Black Hat USA 2018
took place Aug. 4, 2018 through Aug. 9, 2018 (5 years, 8 months ago)
at Mandalay Bay in Las Vegas, Nevada, USA.
The general admission cost for the conference was $2,495.00[1].
Presentations
Wednesday, Aug. 8, 2018
Thursday, Aug. 9, 2018
-
09:00 - Lessons from Virginia - A Comparative Forensic Analysis of WinVote Voting Machines
-
09:00 - ARTist - A Novel Instrumentation Framework for Reversing and Analyzing Android Apps and the Middleware
-
09:00 - Two-Factor Authentication, Usable or Not? A Two-Phase Usability Study of the FIDO U2F Security Key
-
09:00 - Demystifying PTSD in the Cybersecurity Environment
-
09:00 - The Problems and Promise of WebAssembly
-
09:00 - Fire & Ice: Making and Breaking macOS Firewalls
-
09:00 - Money-rity Report: Using Intelligence to Predict the Next Payment Card Fraud Victims
-
09:00 - Stop that Release, There's a Vulnerability!
-
09:00 - Real Eyes, Realize, Real Lies: Beating Deception Technologies
-
09:45 - Snooping on Cellular Gateways and Their Critical Role in ICS
-
09:45 - Identity Theft: Attacks on SSO Systems
-
09:45 - The Windows Notification Facility: Peeling the Onion of the Most Undocumented Kernel Attack Surface Yet
-
09:45 - The Science of Hiring and Retaining Female Cybersecurity Engineers
-
09:45 - Your Voice is My Passport
-
09:45 - Black Box is Dead. Long Live Black Box!
-
09:45 - Kernel Mode Threats and Practical Defenses
-
09:45 - Reconstruct the World from Vanished Shadow: Recovering Deleted VSS Snapshots
-
09:45 - New Norms and Policies in Cyber-Diplomacy
-
11:00 - GOD MODE UNLOCKED - Hardware Backdoors in x86 CPUs
-
11:00 - Decompiler Internals: Microcode
-
11:00 - A Deep Dive into macOS MDM (and How it can be Compromised)
-
11:00 - Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform Capabilities
-
11:00 - Pestilential Protocol: How Unsecure HL7 Messages Threaten Patient Lives
-
11:00 - Stealth Mango and the Prevalence of Mobile Surveillanceware
-
11:00 - Are You Trading Stocks Securely? Exposing Security Flaws in Trading Technologies
-
11:00 - Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels
-
11:00 - AI & ML in Cyber Security - Why Algorithms are Dangerous
-
12:10 - Applied Self-Driving Car Security
-
12:10 - Outsmarting the Smart City
-
12:10 - Playback: A TLS 1.3 Story
-
12:10 - So I became a Domain Controller
-
12:10 - TLBleed: When Protecting Your CPU Caches is Not Enough
-
12:10 - Protecting the Protector, Hardening Machine Learning Defenses Against Adversarial Attacks
-
12:10 - None of My Pixel is Your Business: Active Watermarking Cancellation Against Video Streaming Service
-
12:10 - WebAssembly: A New World of Native Exploits on the Browser
-
12:10 - Wrangling with the Ghost: An Inside Story of Mitigating Speculative Execution Side Channel Vulnerabilities
-
14:30 - Last Call for SATCOM Security
-
14:30 - Exploitation of a Modern Smartphone Baseband
-
14:30 - Windows Offender: Reverse Engineering Windows Defender's Antivirus Emulator
-
14:30 - Automated Discovery of Deserialization Gadget Chains
-
14:30 - Another Flip in the Row
-
14:30 - Catch me, Yes we can! – Pwning Social Engineers using Natural Language Processing Techniques in Real-Time
-
14:30 - How can Someone with Autism Specifically Enhance the Cyber Security Workforce?
-
14:30 - Legal Liability for IOT Cybersecurity Vulnerabilities
-
14:30 - From Thousands of Hours to a Couple of Minutes: Automating Exploit Generation for Arbitrary Types of Kernel Vulnerabilities
-
15:50 - IoT Malware: Comprehensive Survey, Analysis Framework and Case Studies
-
15:50 - Hardening Hyper-V through Offensive Security Research
-
15:50 - Practical Web Cache Poisoning: Redefining 'Unexploitable'
-
15:50 - Lowering the Bar: Deep Learning for Side Channel Analysis
-
15:50 - SirenJack: Cracking a 'Secure' Emergency Warning Siren System
-
15:50 - For the Love of Money: Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems
-
15:50 - SDL That Won't Break the Bank
-
15:50 - Understanding and Exploiting Implanted Medical Devices
-
15:50 - Mainframe [z/OS] Reverse Engineering and Exploit Development
-
17:00 - Return of Bleichenbacher's Oracle Threat (ROBOT)
-
17:00 - The Finest Penetration Testing Framework for Software-Defined Networks
-
17:00 - Follow the White Rabbit: Simplifying Fuzz Testing Using FuzzExMachina
-
17:00 - Lessons and Lulz: The 4th Annual Black Hat USA NOC Report
-
17:00 - It's a PHP Unserialization Vulnerability Jim, but Not as We Know It
-
17:00 - DeepLocker - Concealing Targeted Attacks with AI Locksmithing
-
17:00 - Over-the-Air: How we Remotely Compromised the Gateway, BCM, and Autopilot ECUs of Tesla Cars
-
17:00 - Meltdown: Basics, Details, Consequences
-
17:00 - Unpacking the Packed Unpacker: Reverse Engineering an Android Anti-Analysis Native Library
- ^ This price is meant to give a general idea of the cost of attending the conference. Many conferences have varying prices based on number of days of attendance, early registration, tiers of support, or additional costs for workshops or trainings. The price here is meant to represent the most common cost for the majority of attendees. See the conference's homepage, if applicable, for details.