Blackhat Europe 2012 (White Papers, Slides, Sources)
Ya está disponible el material de la recién acabada BlackHat 2012 Europa. Parece que faltan algunas charlas. Si las ponen actualizaremos esta entrada.
Axelle Apvrille – Guillaume LovetAn Attacker’s Day into Virology: Human vs Computer:
Antonios Atlasis – Attacking IPv6 Implementation Using Fragmentation:
Michael BakerFinding Needles in Haystacks (The Size of Countries):
Andrey Belenko – Dmitry Sklyarov”Secure Password Managers” and “Military-Grade Encryption” on Smartphones: Oh Really?:
Andy DavisHDMI – Hacking Displays Made Interesting:
Stephen de Vries – Beyond Scanning: Automating Web Application Security Tests:
Tyrone Erasmus – The Heavy Metal That Poisoned the Droid:
Takahiro Haruyama – Hiroshi SuzukiOne-byte Modification for Breaking Memory Forensic Analysis:
Marcia Hofmann – Seth SchoenDefending Privacy at the U.S. Border: A Guide for Travelers Carrying Digital Devices:
Jeff Jarmoc – SSL/TLS Interception Proxies and Transitive Trust:
Ling Chuan Lee – Chan Lee YeeGDI Font Fuzzing in Windows Kernel For Fun:
Steve Lord – Drop It Like It’s Hotspot: Hacking Mifi Routers For Nefarious Purposes
Rafal Los – Shane MacDougall Offensive Threat Modeling for Attackers: Turning Threat Modeling on its Head
Matias Madou – Secure in 2010? Broken in 2011!
Mariano Nunez Di Croce – Cyber-Attacks & SAP systems: Is Our Business-Critical Infrastructure Exposed?
Phil Polstra – Preventing “Oh Shit!” Moments for 20 Euros or Less
Jerome Radcliffe – Issues with Embedded Device Disclosures: Helping the Vendors and Recognizing the End-Users
Enno Rey – Daniel Mende All Your Calls Are Still Belong to Us: How We Compromised the Cisco VoIP Crypto Ecosystem
Simon Roses Femerling – Smartphone’s Apps Are Not That Smart: Insecure Development Practices
Paul Royal – Entrapment: Tricking Malware with Transparent, Scalable Malware Analysis
Rahul Sasi – IVR Security- Internal Network Attack via Phone Lines
Justin Searle – Dissecting Smart Meters
Slides Shreeraj Shah – HTML5 Top 10 Threats: Stealth Attacks and Silent Exploits
Sumit Siddharth – Tom ForbesHacking XPATH 2.0
Alexey Sintsov – Lotus Domino: Penetration Through the Controller
Didier Stevens – Malicious PDF Analysis
Ben Williams – They Ought to Know Better: Exploiting Security Gateways via Their Web Interfaces
Chris Wysopal – Data Mining a Mountain of Zero Day Vulnerabilities
Justin Searle – Workshop: SamuraiWTF
Visto en cyberhades.com