[Black Hat Europe 2016] Slide các phần trình bày trong Black Hat Europe 2016

16/06/2015
83
672 bài viết
[Black Hat Europe 2016] Slide các phần trình bày trong Black Hat Europe 2016
Black Hat Europe 2016 đã được tổ chức tại London (Anh) từ 01/11 đến 04/11/2016 với các chủ đề về kỹ thuật chuyên sâu, nghiên cứu mới nhất và lỗ hổng mới được phát hiện. Dưới đây là các bài thuyết trình được trình bày trong phần Hội thảo của sự kiện để các thành viên tham khảo.

(PEN)TESTING VEHICLES WITH CANTOOLZ

https://www.blackhat.com/docs/eu-16/...h-Cantoolz.pdf

50 THOUSAND NEEDLES IN 5 MILLION HAYSTACKS: UNDERSTANDING OLD MALWARE TRICKS TO FIND NEW MALWARE FAMILIES

https://www.blackhat.com/docs/eu-16/...e-Families.pdf

AI BASED ANTIVIRUS: CAN ALPHAAV WIN THE BATTLE IN WHICH MAN HAS FAILED?

https://www.blackhat.com/docs/eu-16/...Has-Failed.pdf

ANOTHER BRICK OFF THE WALL: DECONSTRUCTING WEB APPLICATION FIREWALLS USING AUTOMATA LEARNING

https://www.blackhat.com/docs/eu-16/...a-Learning.pdf

https://www.blackhat.com/docs/eu-16/...earning-wp.pdf

ARMAGEDDON: HOW YOUR SMARTPHONE CPU BREAKS SOFTWARE-LEVEL SECURITY AND PRIVACY

https://www.blackhat.com/docs/eu-16/...nd-Privacy.pdf

https://www.blackhat.com/docs/eu-16/...Privacy-wp.pdf

ATTACKING WINDOWS BY WINDOWS

https://www.blackhat.com/docs/eu-16/...By-Windows.pdf

AUTOMATING INCIDENT RESPONSE: SIT BACK AND RELAX BOTS ARE TAKING OVER

https://www.blackhat.com/docs/eu-16/...aking-Over.pdf

BACKSLASH POWERED SCANNING: HUNTING UNKNOWN VULNERABILITY CLASSES

https://www.blackhat.com/docs/eu-16/...ty-Classes.pdf

https://www.blackhat.com/docs/eu-16/...Classes-wp.pdf

BREAKING BHAD: ABUSING BELKIN HOME AUTOMATION DEVICES

https://www.blackhat.com/docs/eu-16/...on-Devices.pdf

BREAKING BIG DATA: EVADING ANALYSIS OF THE METADATA OF YOUR LIFE

https://www.blackhat.com/docs/eu-16/...-Your-Life.pdf

BYPASSING CLANG'S SAFESTACK FOR FUN AND PROFIT

http://clang.llvm.org/docs/SafeStack.html

https://gcc.gnu.org/ml/gcc/2016-04/msg00083.html

BYPASSING SECURE BOOT USING FAULT INJECTION

https://www.blackhat.com/docs/eu-16/...-Injection.pdf

CHASING FOXES BY THE NUMBERS: PATTERNS OF LIFE AND ACTIVITY IN HACKER FORUMS

https://www.blackhat.com/docs/eu-16/...ker-Forums.pdf

CODE DEOBFUSCATION: INTERTWINING DYNAMIC STATIC AND SYMBOLIC APPROACHES

https://www.blackhat.com/docs/eu-16/...Approaches.pdf

CTX: ELIMINATING BREACH WITH CONTEXT HIDING

https://www.blackhat.com/docs/eu-16/...ext-Hiding.pdf

https://www.blackhat.com/docs/eu-16/...-Hiding-wp.pdf

CYBER JUDO: OFFENSIVE CYBER DEFENSE

https://www.blackhat.com/docs/eu-16/...er-Defense.pdf

DETACH ME NOT - DOS ATTACKS AGAINST 4G CELLULAR USERS WORLDWIDE FROM YOUR DESK

https://www.blackhat.com/docs/eu-16/...ach-Me-Not.pdf

DRAMA: HOW YOUR DRAM BECOMES A SECURITY PROBLEM

https://www.blackhat.com/docs/eu-16/...ty-Problem.pdf

https://www.blackhat.com/docs/eu-16/...Problem-wp.pdf

EFFECTIVE FILE FORMAT FUZZING – THOUGHTS TECHNIQUES AND RESULTS

https://www.blackhat.com/docs/eu-16/...nd-Results.pdf

EGO MARKET: WHEN PEOPLE'S GREED FOR FAME BENEFITS LARGE-SCALE BOTNETS

https://www.blackhat.com/docs/eu-16/...le-Botnets.pdf

https://www.blackhat.com/docs/eu-16/...Botnets-wp.pdf

FLIP FENG SHUI: ROWHAMMERING THE VM'S ISOLATION

https://www.blackhat.com/docs/eu-16/...-Isolation.pdf

https://www.blackhat.com/docs/eu-16/...olation-wp.pdf

GHOST IN THE PLC: DESIGNING AN UNDETECTABLE PROGRAMMABLE LOGIC CONTROLLER ROOTKIT

https://www.blackhat.com/docs/eu-16/...er-Rootkit.pdf

https://www.blackhat.com/docs/eu-16/...Rootkit-wp.pdf

GPU SECURITY EXPOSED

https://www.blackhat.com/docs/eu-16/...ty-Exposed.pdf

HOW TO FOOL AN ADC PART II OR HIDING DESTRUCTION OF TURBINE WITH A LITTLE HELP OF SIGNAL PROCESSING

https://www.blackhat.com/docs/eu-16/...Processing.pdf

I KNOW WHAT YOU SAW LAST MINUTE - THE CHROME BROWSER CASE

https://www.blackhat.com/docs/eu-16/...owser-Case.pdf

https://www.blackhat.com/docs/eu-16/...er-Case-WP.pdf

INSIDE WEB ATTACKS: THE REAL PAYLOADS

LOCKNOTE: CONCLUSIONS AND KEY TAKEAWAYS FROM BLACK HAT EUROPE 2016

MOBILE ESPIONAGE IN THE WILD: PEGASUS AND NATION-STATE LEVEL ATTACKS

https://www.blackhat.com/docs/eu-16/...el-Attacks.pdf

NARCOS COUNTERFEITERS AND SCAMMERS: AN APPROACH TO VISUALIZE ILLEGAL MARKETS

https://www.blackhat.com/docs/eu-16/...al-Markets.pdf

POCKET-SIZED BADNESS: WHY RANSOMWARE COMES AS A PLOT TWIST IN THE CAT-MOUSE GAME

https://www.blackhat.com/docs/eu-16/...Mouse-Game.pdf

RANDOMIZATION CAN'T STOP BPF JIT SPRAY

https://www.blackhat.com/docs/eu-16/...-JIT-Spray.pdf

https://www.blackhat.com/docs/eu-16/...T-Spray-wp.pdf

REAL-WORLD POST-QUANTUM CRYPTOGRAPHY: INTRODUCING THE OPENQUANTUMSAFE SOFTWARE PROJECT
ROOTING EVERY ANDROID: FROM EXTENSION TO EXPLOITATION

https://www.blackhat.com/docs/eu-16/...ploitation.pdf

https://www.blackhat.com/docs/eu-16/...itation-wp.pdf

SIGNING INTO ONE BILLION MOBILE APP ACCOUNTS EFFORTLESSLY WITH OAUTH2.0

https://www.blackhat.com/docs/eu-16/...th-OAuth20.pdf

https://www.blackhat.com/docs/eu-16/...OAuth20-wp.pdf

STUMPING THE MOBILE CHIPSET

https://www.blackhat.com/docs/eu-16/...le-Chipset.pdf

https://www.blackhat.com/docs/eu-16/...Chipset-wp.pdf

TALKING BEHIND YOUR BACK: ATTACKS AND COUNTERMEASURES OF ULTRASONIC CROSS-DEVICE TRACKING

https://www.blackhat.com/docs/eu-16/...e-Tracking.pdf

TOWARDS A POLICY-AGNOSTIC CONTROL-FLOW INTEGRITY IMPLEMENTATION

https://www.blackhat.com/docs/eu-16/...ementation.pdf
USE-AFTER-USE-AFTER-FREE: EXPLOIT UAF BY GENERATING YOUR OWN

https://www.blackhat.com/docs/eu-16/...g-Your-Own.pdf

https://www.blackhat.com/docs/eu-16/...our-Own-wp.pdf

WHEN VIRTUALIZATION ENCOUNTER AFL: A PORTABLE VIRTUAL DEVICE FUZZING FRAMEWORK WITH AFL

https://www.blackhat.com/docs/eu-16/...k-With-AFL.pdf

https://www.blackhat.com/docs/eu-16/...ith-AFL-wp.pdf

WIFI-BASED IMSI CATCHER

https://www.blackhat.com/docs/eu-16/...SI-Catcher.pdf

WITCHCRAFT COMPILER COLLECTION: TOWARDS SELF AWARE COMPUTER PROGRAMS

https://www.blackhat.com/docs/eu-16/...r-Programs.pdf

https://www.blackhat.com/docs/eu-16/...rograms-wp.pdf

Nguồn: Blackhat.com
 
Chỉnh sửa lần cuối bởi người điều hành:
Mời các bạn tham gia Group WhiteHat để thảo luận và cập nhật tin tức an ninh mạng hàng ngày.
Lưu ý từ WhiteHat: Kiến thức an ninh mạng để phòng chống, không làm điều xấu. Luật pháp liên quan
Bên trên