آرشیو Black Hat 2016 Asia

توسط shahin shapoori در ۱۳۹۵-۰۶-۱۸

آرشیو Black Hat 2016 Asia

Black-hat هر ساله کنفراس هایی در زمینه هک و امنیت در نقاط مختلف جهان برگزار میکند که یکی از این کنفرانس ها Black-Hat Asia میباشد که در Marina Bay Sands سنگاپور برگزار شد. از این رو ما ارشیو black-hat 2016 Asia را در این پست برای شما به اشتراک میگذاریم.

  • Keynote: Devaluing Attack: Disincentivizing Threats Against The Next Billion Devices
  • Bypassing Browser Security Policies for Fun and Profit
  • Exploiting Linux and Pax ASLR’s Weaknesses on 32-Bit and 64-Bit Systems
  • The Perl Jam 2: The Camel Strikes Back
  • Practical New Developments in The Breach Attack
  • Multivariate Solutions To Emerging Passive DNS Challenges
  • The Tactical Application Security Program: Getting Stuff Done
  • Numchecker: A System Approach for Kernel Rootkit Detection
  • The Security Wolf of Wall Street: Fighting Crime With High-Frequency Classification and…
  • Automated Detection of Firefox Extension-Reuse Vulnerabilities
  • Su-A-Cyder: Homebrewing Malware for IOS Like a BO$$!
  • The Kitchen’s Finally Burned Down: DLP Security Bakeoff
  • Automated Dynamic Fireware Analysis At Scale: A Case Study on Embedded Web Interfaces
  • Android Commercial Spyware Disease and Medication
  • PLC-Blaster: A worm Living Solely In The PLC
  • Hacking a Professional Drone
  • Cantact: An Open Tool for Automative Exploitation
  • DSCOMPROMISED: A Windows DSC Attack Framework
  • A New CVE-2015-0057 Exploit Technology
  • Enterprise Apps: Bypassing the IOS Gatekeeper
  • Rapid Radio Reversing
  • Break Out of The Truman Show: Active Detection and Escape of Dynamic Binary Instrumentation
  • Let’s See What’s Out There – Mapping the Wireless IOT
  • Never Trust Your Inputs: Causing ‘Catastrophic Physical Consequences’ From The Sensor…
  • Hey, Your Parcel Looks Bad – Fuzzing and Exploiting Parcel -Ization Vulnerabilties in Android
  • Incident Response @ Scale-Building a Next Generation SOC
  • I’m Not a Human: Breaking the Google Recaptcha

A New CVE-2015-0057 Exploit Technology

Android Commercial Spyware Disease and Medication

Automated Detection of Firefox Extension-Reuse Vulnerabilities

Automated Dynamic Fireware Analysis At Scale- A Case Study on Embedded Web Inter

Break Out of The Truman Show- Active Detection and Escape of Dynamic Binary Inst

Bypassing Browser Security Policies for Fun and Profit

Cantact- An Open Tool for Automative Exploitation

DSCOMPROMISED- A Windows DSC Attack Framework

Enterprise Apps- Bypassing the IOS Gatekeeper

Exploiting Linux and Pax ASLR’s Weaknesses on 32-Bit and 64-Bit Systems

Hacking a Professional Drone

Hey_ Your Parcel Looks Bad – Fuzzing and Exploiting Parcel -Ization Vulnerabilti

I’m Not a Human- Breaking the Google Recaptcha

Incident Response @ Scale-Building a Next Generation SOC

Keynote- Devaluing Attack- Disincentivizing Threats Against The Next Billion Dev

Let’s See What’s Out There – Mapping the Wireless IOT

Locknote- Conclusions and Key Takeaways from Black Hat Asia 2016

Multivariate Solutions To Emerging Passive DNS Challenges

Never Trust Your Inputs- Causing ‘Catastrophic Physical Consequences’ From The S

Numchecker- A System Approach for Kernel Rootkit Detection

PLC-Blaster- A worm Living Solely In The PLC

Practical New Developments in The Breach Attack

Rapid Radio Reversing

Su-A-Cyder- Homebrewing Malware for IOS Like a BO$$

The Kitchen’s Finally Burned Down- DLP Security Bakeoff

The Perl Jam 2- The Camel Strikes Back

The Security Wolf of Wall Street- Fighting Crime With High-Frequency Classificat

The Tactical Application Security Program- Getting Stuff Done

یک نظر بدهید

15 − 9 =