2021-12-14 | Biometric and Token Based Access Control Systems Zac Franken | 1:05:33 | 21 | |
|
2021-12-14 | Dynamic Taint Propagation Finding Vulnerabilities Without Attacking Brian Chess & Jacob West | 54:28 | 6 | |
|
2021-12-14 | SCADA Security Jason Larsen | 1:10:02 | 13 | |
|
2021-12-14 | Social Engineering and the CIA Petet Earnest | 1:24:46 | 15 | |
|
2021-12-14 | Exploiting Live Virtual Machine Migration Jon Oberheide | 23:20 | 3 | |
|
2021-12-14 | Botnet Population and Intelligence Gathering Techniques Christopher Davis & David Dagon | 1:12:02 | 29 | |
|
2021-12-14 | In Depth Analyzing and Fuzzing for Qualcomm Hexagon Processor | 38:20 | 21 | |
|
2021-12-14 | Reverse Engineering Compliance Black Hat - Asia - Singapore - 2021 | 30:35 | 9 | |
|
2021-12-14 | Disappeared Coins Steal Hashrate in Stratum Secretly Black Hat - Asia - Singapore - 2021 | 27:19 | 9 | |
|
2021-12-14 | Threat Hunting in Active Directory Environment Black Hat - Asia - Singapore - 2021 | 37:15 | 15 | |
|
2021-12-14 | The Tangled Webview Javascriptinterface Once More | 21:46 | 1 | |
|
2021-12-14 | Racing the Dark A New TOCTTOU Story From Apple's Core | 34:49 | 2 | |
|
2021-12-14 | Blackhat Asia 21Locknote Conclusions and Key Takeaways from Day 1 locknote | 41:26 | 0 | |
|
2021-12-14 | How I Can Unlock Your Smart Door Security Pitfalls in Cross Vendor IoT Access Control | 34:41 | 4 | |
|
2021-12-14 | Apple Neural Engine Internal From ML Algorithm to HW Registers | 29:58 | 4 | |
|
2021-12-14 | Vibe Check IDK About This Why Students May Shy Away From Cyber in a Surveillance State | 36:46 | 3 | |
|
2021-12-14 | Scavenger Misuse Error Handling Leading to Qemu KVM Escape | 35:10 | 6 | |
|
2021-12-14 | Unprotected Broadcasts in Android 9 and 10 Black Hat - Asia - Singapore - 2021 | 24:55 | 27 | |
|
2021-12-14 | In Field Emulation & Fuzzing of PLCs to Uncover the Next Zero Day in Industrial Control Systems | 39:22 | 9 | |
|
2021-12-14 | A General Approach to Bypassing Many Kernel Protections and its Mitigation | 41:18 | 1 | |
|
2021-12-14 | The B MAD Approach to Threat Modeling Black Hat - Asia - Singapore - 2021 | 24:53 | 9 | |
|
2021-12-14 | We Are About to Land How CloudDragon Turns a Nightmare Into Reality | 34:37 | 3 | |
|
2021-12-14 | Domain Borrowing Catch My C2 Traffic if You Can Black Hat - Asia - Singapore - 2021 | 34:33 | 28 | |
|
2021-12-14 | Insights and Predictions What's Next in InfoSec Black Hat - Asia - Singapore - 2021 | 57:08 | 5 | |
|
2021-12-14 | A Mirage of Safety Bug Finding & Exploit Techniques of Top Android Vendor's Privacy Protection Apps | 21:43 | 8 | |
|
2021-12-14 | Wideshears Investigating and Breaking Widevine on QTEE | 26:48 | 28 | |
|
2021-12-14 | A New Era of One Click Attacks How to Break Install Less Apps | 28:13 | 1 | Guide |
|
2021-12-14 | Enter Sandbox Black Hat - Asia - Singapore - 2021 | 35:28 | 0 | |
|
2021-12-14 | X in the Middle Attacking Fast Charging Piles and Electric Vehicles | 28:59 | 1 | |
|
2021-12-14 | A Walk Through Historical Correlations Between Vulnerabilities & Stock Prices | 28:47 | 0 | Walkthrough |
|
2021-12-14 | Keynote Lessons From 11 Billion Breached Records | 45:43 | 2 | |
|
2021-12-14 | The Cost of Complexity Different Vulnerabilities While Implementing the Same RFC | 36:18 | 1 | |
|
2021-12-14 | Give Me a SQL Injection, I Shall PWN IIS and SQL Server | 36:20 | 11 | |
|
2021-12-14 | Alarm DISARM Remotely Exploiting & Disarming Popular Physical Security System from Public Internet | 35:57 | 6 | |
|
2021-12-14 | The Motion Sensor Western The Good, the Bad, and the Ugly | 30:10 | 2 | |
|
2021-12-14 | Hey, You, Get off My Private Data Do Apps Respect Your Privacy as They Claim | 36:58 | 4 | |
|
2021-12-14 | Anti Forensics Reverse Engineering a Leading Phone Forensic Tool | 30:35 | 12 | |
|
2021-12-14 | The Price of Compatibility Defeating macOS Kernel Using Extended File Attributes | 36:23 | 6 | |
|
2021-12-14 | Hiding Objects from Computer Vision by Exploiting Correlation Biases | 27:24 | 2 | |
|
2021-12-14 | Mem2Img Memory Resident Malware Detection via Convolution Neural Network | 27:37 | 9 | |
|
2021-12-14 | The Rise of Potatoes Privilege Escalations in Windows Services | 41:53 | 11 | |
|
2021-12-14 | How Did the Adversaries Abusing the Bitcoin Blockchain Evade Our Takeover | 23:53 | 3 | |
|
2021-12-14 | Mining and Exploiting Mobile Payment Credential Leaks in the Wild | 34:07 | 8 | |
|
2021-12-14 | New Attack Surface in Safari Using Just One Web Audio Vulnerability to Rule Safari | 26:39 | 5 | |
|
2021-12-14 | Pre built JOP Chains with the JOP ROCKET Bypassing DEP without ROP | 36:58 | 9 | |
|
2021-12-14 | WIFI Important Remote Attack Surface Threat is Expanding | 26:36 | 1 | |
|
2021-12-14 | Hey Google, Activate Spyware When Google Assistant Uses a Vulnerability as a Feature | 28:23 | 2 | |
|
2021-12-14 | From an URGENT 11 Vulnerability to a Full Take Down of a Factory, Using a Single Packet | 29:08 | 5 | |
|
2021-12-14 | First Contact Vulnerabilities in Contactless Payments Black Hat - Asia - Singapore - 2020 | 37:24 | 10 | |
|
2021-12-14 | Tracking the Criminal of Fake News Based on a Unified Embedding | 22:36 | 1 | |
|
2021-12-14 | Faking a Factory Creating and Operating a Realistic Honeypot Black Hat - Asia - Singapore - 2020 | 32:18 | 15 | |
|
2021-12-14 | Misuse of DNS, the Second Most Used Protocol Black Hat - Asia - Singapore - 2020 | 25:41 | 12 | |
|
2021-12-14 | The Inside Story There are Apps in Apps and Here is How to Break Them | 24:42 | 0 | Guide |
|
2021-12-14 | May the Trust be with You Empowering TrustZone M with Multiple Trusted Environments | 26:42 | 3 | |
|
2021-12-14 | Escaping Virtualized Containers Black Hat - Asia - Singapore - 2020 | 40:56 | 6 | |
|
2021-12-14 | Back to the Future Cross Protocol Attacks in the Era of 5G | 26:28 | 5 | |
|
2021-12-14 | The Evil of Spy Camera Black Hat - Asia - Singapore - 2020 | 32:01 | 28 | |
|
2021-12-14 | Making an Impact from India to the Rest of the World by Building & Nurturing Women Infosec Community | 34:23 | 0 | |
|
2021-12-14 | Attacking and Defending Machine Learning Applications of Public Cloud | 20:28 | 1 | |
|
2021-12-14 | The Evil Alt Ego abusing HTTP Alternative Services Black Hat - Asia - Singapore - 2020 | 32:43 | 8 | |
|
2021-12-14 | The Black Hat NOC Greatest Hits and Holy Cows Black Hat - Asia - Singapore - 2020 | 44:36 | 9 | |
|
2021-12-14 | Engineering Cybersecurity for a Nation What Singapore is Learning from Cars and Sanitation | 37:55 | 0 | |
|
2021-12-14 | Adversary Detection Pipelines Finally Making Your Threat Intel Useful | 37:34 | 1 | |
|
2021-12-14 | Store to Leak Forwarding There and Back Again | 35:55 | 0 | |
|
2021-12-14 | Win the 0 Day Racing Game Against Botnet in Public Cloud | 22:37 | 4 | |
|
2021-12-14 | 3d Red Pill A Guest to Host Escape on QEMU KVM Virtio Device | 27:24 | 9 | |
|
2021-12-14 | Securing the Next Version of HTTP How QUIC and HTTP 3 Compare to HTTP 2 | 33:58 | 11 | |
|
2021-12-14 | Biometrics & Privacy Time to Faceoff or is that FaceApp | 37:05 | 2 | |
|
2021-12-14 | Locknote Conclusions and Key Takeaways from Day 2 | 39:16 | 0 | |
|
2021-12-14 | Dynamic Binary Instrumentation Techniques to Address Native Code Obfuscation | 40:21 | 22 | |
|
2021-12-14 | Raiden Glitching Framework Black Hat - Asia - Singapore - 2020 | 42:48 | 19 | |
|
2021-12-14 | Redback Advanced Static Binary Injection Black Hat - Asia - Singapore - 2020 | 34:00 | 35 | |
|
2021-12-14 | Wi Fi Brokering Black Hat - Asia - Singapore - 2020 | 32:36 | 6 | |
|
2021-12-14 | Locknote Conclusions and Key Takeaways from Day 1 Black Hat - Asia - Singapore - 2020 | 40:48 | 1 | |
|
2021-12-14 | Demystify Today's Binary Disassembling and How Modern ABI Makes it Easier | 20:59 | 1 | |
|
2021-12-14 | CDPwn Taking Over Millions of Enterprise Things with Layer 2 Zero Days | 37:24 | 0 | |
|
2021-12-14 | Complexity Killed Security Black Hat - Asia - Singapore - 2020 | 28:02 | 2 | |
|
2021-12-14 | What the Log So Many Events, so Little Time Black Hat - Asia - Singapore - 2020 | 40:57 | 1 | Vlog |
|
2021-12-14 | Kr00k How KRACKing Amazon Echo Exposed a Billion Vulnerable Wi Fi Devices | 34:52 | 3 | |
|
2021-12-14 | Patching Loopholes Finding Backdoors in Applications Black Hat - Asia - Singapore - 2020 | 17:39 | 1 | |
|
2021-12-14 | Walking Your Dog in Multiple Forests Breaking AD Trust Boundaries through Kerberos Vulnerabilities | 35:09 | 1 | |
|
2021-12-14 | BitLeaker Subverting BitLocker with One Vulnerability | 38:07 | 25 | |
|
2021-12-14 | Page Cache Attacks Microarchitectural Attacks on Flawless Hardware | 35:13 | 4 | |
|
2021-12-14 | Identifying Multi Binary Vulnerabilities in Embedded Firmware at Scale | 33:01 | 1 | |
|
2021-12-14 | Black Hat Asia 2019 Keynote The Next Arms Race | 58:05 | 4 | |
|
2021-12-14 | Intel VISA Through the Rabbit Hole Black Hat - Asia - Singapore - 2019 | 59:47 | 22 | |
|
2021-12-14 | Investigating Malware Using Memory Forensics A Practical Approach | 1:03:22 | 25 | |
|
2021-12-14 | Keep Everyone In Sync Effective Approaches Borrowed from Open Source Communities | 49:27 | 0 | |
|
2021-12-14 | CQTools The New Ultimate Hacking Toolkit Black Hat - Asia - Singapore - 2019 | 1:01:55 | 23 | |
|
2021-12-14 | How to Survive the Hardware Assisted Control Flow Integrity Enforcement | 1:05:11 | 3 | Guide |
|
2021-12-14 | Office in Wonderland Black Hat - Asia - Singapore - 2019 | 50:31 | 4 | |
|
2021-12-14 | Return of the Insecure Brazilian Voting Machines Black Hat - Asia - Singapore - 2019 | 55:17 | 4 | |
|
2021-12-14 | Zombie POODLE, GOLDENDOODLE, and How TLSv1 3 Can Save Us All | 41:19 | 11 | |
|
2021-12-14 | PASTA Portable Automotive Security Testbed with Adaptability Black Hat - Asia - Singapore - 2019 | 45:54 | 4 | |
|
2021-12-14 | See Like a Bat Using Echo Analysis to Detect Man in the Middle Attacks in LANs | 21:20 | 1 | |
|
2021-12-13 | DevSecOps What, Why and How Black Hat - Asia - Singapore - 2019 | 39:06 | 28 | |
|
2021-12-13 | iOS Dual Booting Demystified Black Hat - Asia - Singapore - 2019 | 50:39 | 8 | |
|
2021-12-13 | Preloading Insecurity In Your Electron Black Hat - Asia - Singapore - 2019 | 47:56 | 15 | |
|
2021-12-13 | Winter is Coming Back Black Hat - Asia - Singapore - 2019 | 39:59 | 11 | |
|
2021-12-13 | When Good Turns Evil Using Intel SGX to Stealthily Steal Bitcoins | 53:33 | 1 | |
|