Presentaciones De Black Hat Asia 2018
Ya están disponibles la mayoría de las presentaciones de Black Hat Asi 2018 celebrada el pasado 20-23 de marzo:
- A Short Course in Cyber Warfare
- National Cyber-Aggression and Private-Sector Internet Infrastructure
- A Deal with the Devil: Breaking Smart Contracts
- A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages!
- AES Wireless Keyboard – Template Attack for Eavesdropping
- All Your Payment Tokens Are Mine: Vulnerabilities of Mobile Payment Systems
- Analyzing & Breaking Exploit Mitigations and PRNGs on QNX for Automotive Industrial Medical and other Embedded Systems
- Back To The Epilogue: How to Evade Windows’ Control Flow Guard with Less than 16 Bytes
- Breach Detection At Scale With AWS Honey Tokens
- Breaking State-of-the-Art Binary Code Obfuscation via Program Synthesis
- Breaking the Attack Graph: How to Leverage Graphs to Strengthen Security in a Domain Environment
- Counter-Infiltration: Future-Proof Counter Attacks Against Exploit Kit Infrastructure
- Cyber Comrades: Alliance-Building in Cyberspace
- Death Profile
- Documenting the Undocumented: The Rise and Fall of AMSI
- eMMC & UFS: Security Vulnerabilities Rootkits
- Hourglass Model 2.0: Case Study of Southeast Asia Underground Services Abusing Global 2FA
- I Don’t Want to Sleep Tonight: Subverting Intel TXT with S3 Sleep
- International Problems: Serialized Fuzzing for ICU Vulnerabilities
- Invoke-DOSfuscation: Techniques FOR %F IN (-style) DO (S-level CMD Obfuscation)
- KSMA: Breaking Android Kernel Isolation and Rooting with ARM MMU Features
- Locknote: Conclusions and Key Takeaways from Black Hat Asia 2018
- Mac-A-Mal: An Automated Platform for Mac Malware Hunting
- Nation-State Moneymule’s Hunting Season – APT Attacks Targeting Financial Institutions
- New Compat Vulnerabilities in Linux Device Drivers
- Prison Break Season 6: Defeating the Mitigations Adopted by Android OEMs
- return-to-csu: A New Method to Bypass 64-bit Linux ASLR
- RustZone: Writing Trusted Applications in Rust
- Securing Your In-Ear-Fitness Coach: Challenges in Hardening Next Generation Wearables
- Server Tailgating - A Chosen-PlainText Attack on RDP
- Shadow-Box v2: The Practical and Omnipotent Sandbox for ARM
- Tales from the NOC: Going Public in Asia
- UbootKit: A Worm Attack for the Bootloader of IoT Devices
- VSPMiner: Detecting Security Hazards in SEAndroid Vendor Customizations via Large-Scale Supervised Machine Learning
- When Good Turns Evil: Using Intel SGX to Stealthily Steal Bitcoins
- XOM-switch: Hiding Your Code from Advanced Code Reuse Attacks In One Shot
Via: feedproxy.google.com
Presentaciones De Black Hat Asia 2018
Reviewed by Anónimo
on
13:49
Rating: