WhiteHat News #ID:2112
VIP Members
-
16/06/2015
-
83
-
672 bài viết
[Black Hat Europe 2016] Slide các phần trình bày trong Black Hat Europe 2016
Black Hat Europe 2016 đã được tổ chức tại London (Anh) từ 01/11 đến 04/11/2016 với các chủ đề về kỹ thuật chuyên sâu, nghiên cứu mới nhất và lỗ hổng mới được phát hiện. Dưới đây là các bài thuyết trình được trình bày trong phần Hội thảo của sự kiện để các thành viên tham khảo.
(PEN)TESTING VEHICLES WITH CANTOOLZ
https://www.blackhat.com/docs/eu-16/...h-Cantoolz.pdf
50 THOUSAND NEEDLES IN 5 MILLION HAYSTACKS: UNDERSTANDING OLD MALWARE TRICKS TO FIND NEW MALWARE FAMILIES
https://www.blackhat.com/docs/eu-16/...e-Families.pdf
AI BASED ANTIVIRUS: CAN ALPHAAV WIN THE BATTLE IN WHICH MAN HAS FAILED?
https://www.blackhat.com/docs/eu-16/...Has-Failed.pdf
ANOTHER BRICK OFF THE WALL: DECONSTRUCTING WEB APPLICATION FIREWALLS USING AUTOMATA LEARNING
https://www.blackhat.com/docs/eu-16/...a-Learning.pdf
https://www.blackhat.com/docs/eu-16/...earning-wp.pdf
ARMAGEDDON: HOW YOUR SMARTPHONE CPU BREAKS SOFTWARE-LEVEL SECURITY AND PRIVACY
https://www.blackhat.com/docs/eu-16/...nd-Privacy.pdf
https://www.blackhat.com/docs/eu-16/...Privacy-wp.pdf
ATTACKING WINDOWS BY WINDOWS
https://www.blackhat.com/docs/eu-16/...By-Windows.pdf
AUTOMATING INCIDENT RESPONSE: SIT BACK AND RELAX BOTS ARE TAKING OVER
https://www.blackhat.com/docs/eu-16/...aking-Over.pdf
BACKSLASH POWERED SCANNING: HUNTING UNKNOWN VULNERABILITY CLASSES
https://www.blackhat.com/docs/eu-16/...ty-Classes.pdf
https://www.blackhat.com/docs/eu-16/...Classes-wp.pdf
BREAKING BHAD: ABUSING BELKIN HOME AUTOMATION DEVICES
https://www.blackhat.com/docs/eu-16/...on-Devices.pdf
BREAKING BIG DATA: EVADING ANALYSIS OF THE METADATA OF YOUR LIFE
https://www.blackhat.com/docs/eu-16/...-Your-Life.pdf
BYPASSING CLANG'S SAFESTACK FOR FUN AND PROFIT
http://clang.llvm.org/docs/SafeStack.html
https://gcc.gnu.org/ml/gcc/2016-04/msg00083.html
BYPASSING SECURE BOOT USING FAULT INJECTION
https://www.blackhat.com/docs/eu-16/...-Injection.pdf
CHASING FOXES BY THE NUMBERS: PATTERNS OF LIFE AND ACTIVITY IN HACKER FORUMS
https://www.blackhat.com/docs/eu-16/...ker-Forums.pdf
CODE DEOBFUSCATION: INTERTWINING DYNAMIC STATIC AND SYMBOLIC APPROACHES
https://www.blackhat.com/docs/eu-16/...Approaches.pdf
CTX: ELIMINATING BREACH WITH CONTEXT HIDING
https://www.blackhat.com/docs/eu-16/...ext-Hiding.pdf
https://www.blackhat.com/docs/eu-16/...-Hiding-wp.pdf
CYBER JUDO: OFFENSIVE CYBER DEFENSE
https://www.blackhat.com/docs/eu-16/...er-Defense.pdf
DETACH ME NOT - DOS ATTACKS AGAINST 4G CELLULAR USERS WORLDWIDE FROM YOUR DESK
https://www.blackhat.com/docs/eu-16/...ach-Me-Not.pdf
DRAMA: HOW YOUR DRAM BECOMES A SECURITY PROBLEM
https://www.blackhat.com/docs/eu-16/...ty-Problem.pdf
https://www.blackhat.com/docs/eu-16/...Problem-wp.pdf
EFFECTIVE FILE FORMAT FUZZING – THOUGHTS TECHNIQUES AND RESULTS
https://www.blackhat.com/docs/eu-16/...nd-Results.pdf
EGO MARKET: WHEN PEOPLE'S GREED FOR FAME BENEFITS LARGE-SCALE BOTNETS
https://www.blackhat.com/docs/eu-16/...le-Botnets.pdf
https://www.blackhat.com/docs/eu-16/...Botnets-wp.pdf
FLIP FENG SHUI: ROWHAMMERING THE VM'S ISOLATION
https://www.blackhat.com/docs/eu-16/...-Isolation.pdf
https://www.blackhat.com/docs/eu-16/...olation-wp.pdf
GHOST IN THE PLC: DESIGNING AN UNDETECTABLE PROGRAMMABLE LOGIC CONTROLLER ROOTKIT
https://www.blackhat.com/docs/eu-16/...er-Rootkit.pdf
https://www.blackhat.com/docs/eu-16/...Rootkit-wp.pdf
GPU SECURITY EXPOSED
https://www.blackhat.com/docs/eu-16/...ty-Exposed.pdf
HOW TO FOOL AN ADC PART II OR HIDING DESTRUCTION OF TURBINE WITH A LITTLE HELP OF SIGNAL PROCESSING
https://www.blackhat.com/docs/eu-16/...Processing.pdf
I KNOW WHAT YOU SAW LAST MINUTE - THE CHROME BROWSER CASE
https://www.blackhat.com/docs/eu-16/...owser-Case.pdf
https://www.blackhat.com/docs/eu-16/...er-Case-WP.pdf
INSIDE WEB ATTACKS: THE REAL PAYLOADS
LOCKNOTE: CONCLUSIONS AND KEY TAKEAWAYS FROM BLACK HAT EUROPE 2016
MOBILE ESPIONAGE IN THE WILD: PEGASUS AND NATION-STATE LEVEL ATTACKS
https://www.blackhat.com/docs/eu-16/...el-Attacks.pdf
NARCOS COUNTERFEITERS AND SCAMMERS: AN APPROACH TO VISUALIZE ILLEGAL MARKETS
https://www.blackhat.com/docs/eu-16/...al-Markets.pdf
POCKET-SIZED BADNESS: WHY RANSOMWARE COMES AS A PLOT TWIST IN THE CAT-MOUSE GAME
https://www.blackhat.com/docs/eu-16/...Mouse-Game.pdf
RANDOMIZATION CAN'T STOP BPF JIT SPRAY
https://www.blackhat.com/docs/eu-16/...-JIT-Spray.pdf
https://www.blackhat.com/docs/eu-16/...T-Spray-wp.pdf
REAL-WORLD POST-QUANTUM CRYPTOGRAPHY: INTRODUCING THE OPENQUANTUMSAFE SOFTWARE PROJECT
ROOTING EVERY ANDROID: FROM EXTENSION TO EXPLOITATION
https://www.blackhat.com/docs/eu-16/...ploitation.pdf
https://www.blackhat.com/docs/eu-16/...itation-wp.pdf
SIGNING INTO ONE BILLION MOBILE APP ACCOUNTS EFFORTLESSLY WITH OAUTH2.0
https://www.blackhat.com/docs/eu-16/...th-OAuth20.pdf
https://www.blackhat.com/docs/eu-16/...OAuth20-wp.pdf
STUMPING THE MOBILE CHIPSET
https://www.blackhat.com/docs/eu-16/...le-Chipset.pdf
https://www.blackhat.com/docs/eu-16/...Chipset-wp.pdf
TALKING BEHIND YOUR BACK: ATTACKS AND COUNTERMEASURES OF ULTRASONIC CROSS-DEVICE TRACKING
https://www.blackhat.com/docs/eu-16/...e-Tracking.pdf
TOWARDS A POLICY-AGNOSTIC CONTROL-FLOW INTEGRITY IMPLEMENTATION
https://www.blackhat.com/docs/eu-16/...ementation.pdf
USE-AFTER-USE-AFTER-FREE: EXPLOIT UAF BY GENERATING YOUR OWN
https://www.blackhat.com/docs/eu-16/...g-Your-Own.pdf
https://www.blackhat.com/docs/eu-16/...our-Own-wp.pdf
WHEN VIRTUALIZATION ENCOUNTER AFL: A PORTABLE VIRTUAL DEVICE FUZZING FRAMEWORK WITH AFL
https://www.blackhat.com/docs/eu-16/...k-With-AFL.pdf
https://www.blackhat.com/docs/eu-16/...ith-AFL-wp.pdf
WIFI-BASED IMSI CATCHER
https://www.blackhat.com/docs/eu-16/...SI-Catcher.pdf
WITCHCRAFT COMPILER COLLECTION: TOWARDS SELF AWARE COMPUTER PROGRAMS
https://www.blackhat.com/docs/eu-16/...r-Programs.pdf
https://www.blackhat.com/docs/eu-16/...rograms-wp.pdf
Nguồn: Blackhat.com
(PEN)TESTING VEHICLES WITH CANTOOLZ
https://www.blackhat.com/docs/eu-16/...h-Cantoolz.pdf
50 THOUSAND NEEDLES IN 5 MILLION HAYSTACKS: UNDERSTANDING OLD MALWARE TRICKS TO FIND NEW MALWARE FAMILIES
https://www.blackhat.com/docs/eu-16/...e-Families.pdf
AI BASED ANTIVIRUS: CAN ALPHAAV WIN THE BATTLE IN WHICH MAN HAS FAILED?
https://www.blackhat.com/docs/eu-16/...Has-Failed.pdf
ANOTHER BRICK OFF THE WALL: DECONSTRUCTING WEB APPLICATION FIREWALLS USING AUTOMATA LEARNING
https://www.blackhat.com/docs/eu-16/...a-Learning.pdf
https://www.blackhat.com/docs/eu-16/...earning-wp.pdf
ARMAGEDDON: HOW YOUR SMARTPHONE CPU BREAKS SOFTWARE-LEVEL SECURITY AND PRIVACY
https://www.blackhat.com/docs/eu-16/...nd-Privacy.pdf
https://www.blackhat.com/docs/eu-16/...Privacy-wp.pdf
ATTACKING WINDOWS BY WINDOWS
https://www.blackhat.com/docs/eu-16/...By-Windows.pdf
AUTOMATING INCIDENT RESPONSE: SIT BACK AND RELAX BOTS ARE TAKING OVER
https://www.blackhat.com/docs/eu-16/...aking-Over.pdf
BACKSLASH POWERED SCANNING: HUNTING UNKNOWN VULNERABILITY CLASSES
https://www.blackhat.com/docs/eu-16/...ty-Classes.pdf
https://www.blackhat.com/docs/eu-16/...Classes-wp.pdf
BREAKING BHAD: ABUSING BELKIN HOME AUTOMATION DEVICES
https://www.blackhat.com/docs/eu-16/...on-Devices.pdf
BREAKING BIG DATA: EVADING ANALYSIS OF THE METADATA OF YOUR LIFE
https://www.blackhat.com/docs/eu-16/...-Your-Life.pdf
BYPASSING CLANG'S SAFESTACK FOR FUN AND PROFIT
http://clang.llvm.org/docs/SafeStack.html
https://gcc.gnu.org/ml/gcc/2016-04/msg00083.html
BYPASSING SECURE BOOT USING FAULT INJECTION
https://www.blackhat.com/docs/eu-16/...-Injection.pdf
CHASING FOXES BY THE NUMBERS: PATTERNS OF LIFE AND ACTIVITY IN HACKER FORUMS
https://www.blackhat.com/docs/eu-16/...ker-Forums.pdf
CODE DEOBFUSCATION: INTERTWINING DYNAMIC STATIC AND SYMBOLIC APPROACHES
https://www.blackhat.com/docs/eu-16/...Approaches.pdf
CTX: ELIMINATING BREACH WITH CONTEXT HIDING
https://www.blackhat.com/docs/eu-16/...ext-Hiding.pdf
https://www.blackhat.com/docs/eu-16/...-Hiding-wp.pdf
CYBER JUDO: OFFENSIVE CYBER DEFENSE
https://www.blackhat.com/docs/eu-16/...er-Defense.pdf
DETACH ME NOT - DOS ATTACKS AGAINST 4G CELLULAR USERS WORLDWIDE FROM YOUR DESK
https://www.blackhat.com/docs/eu-16/...ach-Me-Not.pdf
DRAMA: HOW YOUR DRAM BECOMES A SECURITY PROBLEM
https://www.blackhat.com/docs/eu-16/...ty-Problem.pdf
https://www.blackhat.com/docs/eu-16/...Problem-wp.pdf
EFFECTIVE FILE FORMAT FUZZING – THOUGHTS TECHNIQUES AND RESULTS
https://www.blackhat.com/docs/eu-16/...nd-Results.pdf
EGO MARKET: WHEN PEOPLE'S GREED FOR FAME BENEFITS LARGE-SCALE BOTNETS
https://www.blackhat.com/docs/eu-16/...le-Botnets.pdf
https://www.blackhat.com/docs/eu-16/...Botnets-wp.pdf
FLIP FENG SHUI: ROWHAMMERING THE VM'S ISOLATION
https://www.blackhat.com/docs/eu-16/...-Isolation.pdf
https://www.blackhat.com/docs/eu-16/...olation-wp.pdf
GHOST IN THE PLC: DESIGNING AN UNDETECTABLE PROGRAMMABLE LOGIC CONTROLLER ROOTKIT
https://www.blackhat.com/docs/eu-16/...er-Rootkit.pdf
https://www.blackhat.com/docs/eu-16/...Rootkit-wp.pdf
GPU SECURITY EXPOSED
https://www.blackhat.com/docs/eu-16/...ty-Exposed.pdf
HOW TO FOOL AN ADC PART II OR HIDING DESTRUCTION OF TURBINE WITH A LITTLE HELP OF SIGNAL PROCESSING
https://www.blackhat.com/docs/eu-16/...Processing.pdf
I KNOW WHAT YOU SAW LAST MINUTE - THE CHROME BROWSER CASE
https://www.blackhat.com/docs/eu-16/...owser-Case.pdf
https://www.blackhat.com/docs/eu-16/...er-Case-WP.pdf
INSIDE WEB ATTACKS: THE REAL PAYLOADS
LOCKNOTE: CONCLUSIONS AND KEY TAKEAWAYS FROM BLACK HAT EUROPE 2016
MOBILE ESPIONAGE IN THE WILD: PEGASUS AND NATION-STATE LEVEL ATTACKS
https://www.blackhat.com/docs/eu-16/...el-Attacks.pdf
NARCOS COUNTERFEITERS AND SCAMMERS: AN APPROACH TO VISUALIZE ILLEGAL MARKETS
https://www.blackhat.com/docs/eu-16/...al-Markets.pdf
POCKET-SIZED BADNESS: WHY RANSOMWARE COMES AS A PLOT TWIST IN THE CAT-MOUSE GAME
https://www.blackhat.com/docs/eu-16/...Mouse-Game.pdf
RANDOMIZATION CAN'T STOP BPF JIT SPRAY
https://www.blackhat.com/docs/eu-16/...-JIT-Spray.pdf
https://www.blackhat.com/docs/eu-16/...T-Spray-wp.pdf
REAL-WORLD POST-QUANTUM CRYPTOGRAPHY: INTRODUCING THE OPENQUANTUMSAFE SOFTWARE PROJECT
ROOTING EVERY ANDROID: FROM EXTENSION TO EXPLOITATION
https://www.blackhat.com/docs/eu-16/...ploitation.pdf
https://www.blackhat.com/docs/eu-16/...itation-wp.pdf
SIGNING INTO ONE BILLION MOBILE APP ACCOUNTS EFFORTLESSLY WITH OAUTH2.0
https://www.blackhat.com/docs/eu-16/...th-OAuth20.pdf
https://www.blackhat.com/docs/eu-16/...OAuth20-wp.pdf
STUMPING THE MOBILE CHIPSET
https://www.blackhat.com/docs/eu-16/...le-Chipset.pdf
https://www.blackhat.com/docs/eu-16/...Chipset-wp.pdf
TALKING BEHIND YOUR BACK: ATTACKS AND COUNTERMEASURES OF ULTRASONIC CROSS-DEVICE TRACKING
https://www.blackhat.com/docs/eu-16/...e-Tracking.pdf
TOWARDS A POLICY-AGNOSTIC CONTROL-FLOW INTEGRITY IMPLEMENTATION
https://www.blackhat.com/docs/eu-16/...ementation.pdf
USE-AFTER-USE-AFTER-FREE: EXPLOIT UAF BY GENERATING YOUR OWN
https://www.blackhat.com/docs/eu-16/...g-Your-Own.pdf
https://www.blackhat.com/docs/eu-16/...our-Own-wp.pdf
WHEN VIRTUALIZATION ENCOUNTER AFL: A PORTABLE VIRTUAL DEVICE FUZZING FRAMEWORK WITH AFL
https://www.blackhat.com/docs/eu-16/...k-With-AFL.pdf
https://www.blackhat.com/docs/eu-16/...ith-AFL-wp.pdf
WIFI-BASED IMSI CATCHER
https://www.blackhat.com/docs/eu-16/...SI-Catcher.pdf
WITCHCRAFT COMPILER COLLECTION: TOWARDS SELF AWARE COMPUTER PROGRAMS
https://www.blackhat.com/docs/eu-16/...r-Programs.pdf
https://www.blackhat.com/docs/eu-16/...rograms-wp.pdf
Nguồn: Blackhat.com
Chỉnh sửa lần cuối bởi người điều hành: