Presentaciones De Black Hat Asia 2018
Ya están disponibles la mayoría de las presentaciones de Black Hat Asi 2018 celebrada el pasado 20-23 de marzo:
- A Short Course in Cyber Warfare
- National Cyber-Aggression and Private-Sector Internet Infrastructure
- A Deal with the Devil: Breaking Smart Contracts
- A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages!
- AES Wireless Keyboard – Template Attack for Eavesdropping
- All Your Payment Tokens Are Mine: Vulnerabilities of Mobile Payment Systems
- Analyzing & Breaking Exploit Mitigations and PRNGs on QNX for Automotive Industrial Medical and other Embedded Systems
- Back To The Epilogue: How to Evade Windows’ Control Flow Guard with Less than 16 Bytes
- Breach Detection At Scale With AWS Honey Tokens
- Breaking State-of-the-Art Binary Code Obfuscation via Program Synthesis
- Breaking the Attack Graph: How to Leverage Graphs to Strengthen Security in a Domain Environment
- Counter-Infiltration: Future-Proof Counter Attacks Against Exploit Kit Infrastructure
- Cyber Comrades: Alliance-Building in Cyberspace
- Death Profile
- Documenting the Undocumented: The Rise and Fall of AMSI
- eMMC & UFS: Security Vulnerabilities Rootkits
- Hourglass Model 2.0: Case Study of Southeast Asia Underground Services Abusing Global 2FA
- [Asia-18-CHUNG-Hourglass 2.0.pdf](https://www.blackhat.com/docs/asia-18/Asia-18-CHUNG-Hourglass 2.0.pdf)
- I Don’t Want to Sleep Tonight: Subverting Intel TXT with S3 Sleep
- International Problems: Serialized Fuzzing for ICU Vulnerabilities
- Invoke-DOSfuscation: Techniques FOR %F IN (-style) DO (S-level CMD Obfuscation)
- KSMA: Breaking Android Kernel Isolation and Rooting with ARM MMU Features
- Locknote: Conclusions and Key Takeaways from Black Hat Asia 2018
- Mac-A-Mal: An Automated Platform for Mac Malware Hunting
- Nation-State Moneymule’s Hunting Season – APT Attacks Targeting Financial Institutions
- New Compat Vulnerabilities in Linux Device Drivers
- Prison Break Season 6: Defeating the Mitigations Adopted by Android OEMs
- return-to-csu: A New Method to Bypass 64-bit Linux ASLR
- RustZone: Writing Trusted Applications in Rust
- Securing Your In-Ear-Fitness Coach: Challenges in Hardening Next Generation Wearables
- Server Tailgating - A Chosen-PlainText Attack on RDP
- Shadow-Box v2: The Practical and Omnipotent Sandbox for ARM
- Tales from the NOC: Going Public in Asia
- UbootKit: A Worm Attack for the Bootloader of IoT Devices
- VSPMiner: Detecting Security Hazards in SEAndroid Vendor Customizations via Large-Scale Supervised Machine Learning
- When Good Turns Evil: Using Intel SGX to Stealthily Steal Bitcoins
- XOM-switch: Hiding Your Code from Advanced Code Reuse Attacks In One Shot
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec