[Black Hat Europe 2016] Slide các phần trình bày trong Black Hat Europe 2016

Thảo luận trong 'Black Hat Europe 2016' bắt đầu bởi WhiteHat News #ID:2112, 08/11/16, 02:11 PM.

  1. WhiteHat News #ID:2112

    WhiteHat News #ID:2112 WhiteHat Support

    Tham gia: 16/06/15, 03:06 PM
    Bài viết: 510
    Đã được thích: 72
    Điểm thành tích:
    48
    Black Hat Europe 2016 đã được tổ chức tại London (Anh) từ 01/11 đến 04/11/2016 với các chủ đề về kỹ thuật chuyên sâu, nghiên cứu mới nhất và lỗ hổng mới được phát hiện. Dưới đây là các bài thuyết trình được trình bày trong phần Hội thảo của sự kiện để các thành viên tham khảo.

    (PEN)TESTING VEHICLES WITH CANTOOLZ

    https://www.blackhat.com/docs/eu-16/...h-Cantoolz.pdf

    50 THOUSAND NEEDLES IN 5 MILLION HAYSTACKS: UNDERSTANDING OLD MALWARE TRICKS TO FIND NEW MALWARE FAMILIES

    https://www.blackhat.com/docs/eu-16/...e-Families.pdf

    AI BASED ANTIVIRUS: CAN ALPHAAV WIN THE BATTLE IN WHICH MAN HAS FAILED?

    https://www.blackhat.com/docs/eu-16/...Has-Failed.pdf

    ANOTHER BRICK OFF THE WALL: DECONSTRUCTING WEB APPLICATION FIREWALLS USING AUTOMATA LEARNING

    https://www.blackhat.com/docs/eu-16/...a-Learning.pdf

    https://www.blackhat.com/docs/eu-16/...earning-wp.pdf

    ARMAGEDDON: HOW YOUR SMARTPHONE CPU BREAKS SOFTWARE-LEVEL SECURITY AND PRIVACY

    https://www.blackhat.com/docs/eu-16/...nd-Privacy.pdf

    https://www.blackhat.com/docs/eu-16/...Privacy-wp.pdf

    ATTACKING WINDOWS BY WINDOWS

    https://www.blackhat.com/docs/eu-16/...By-Windows.pdf

    AUTOMATING INCIDENT RESPONSE: SIT BACK AND RELAX BOTS ARE TAKING OVER

    https://www.blackhat.com/docs/eu-16/...aking-Over.pdf

    BACKSLASH POWERED SCANNING: HUNTING UNKNOWN VULNERABILITY CLASSES

    https://www.blackhat.com/docs/eu-16/...ty-Classes.pdf

    https://www.blackhat.com/docs/eu-16/...Classes-wp.pdf

    BREAKING BHAD: ABUSING BELKIN HOME AUTOMATION DEVICES

    https://www.blackhat.com/docs/eu-16/...on-Devices.pdf

    BREAKING BIG DATA: EVADING ANALYSIS OF THE METADATA OF YOUR LIFE

    https://www.blackhat.com/docs/eu-16/...-Your-Life.pdf

    BYPASSING CLANG'S SAFESTACK FOR FUN AND PROFIT

    http://clang.llvm.org/docs/SafeStack.html

    https://gcc.gnu.org/ml/gcc/2016-04/msg00083.html

    BYPASSING SECURE BOOT USING FAULT INJECTION

    https://www.blackhat.com/docs/eu-16/...-Injection.pdf

    CHASING FOXES BY THE NUMBERS: PATTERNS OF LIFE AND ACTIVITY IN HACKER FORUMS

    https://www.blackhat.com/docs/eu-16/...ker-Forums.pdf

    CODE DEOBFUSCATION: INTERTWINING DYNAMIC STATIC AND SYMBOLIC APPROACHES

    https://www.blackhat.com/docs/eu-16/...Approaches.pdf

    CTX: ELIMINATING BREACH WITH CONTEXT HIDING

    https://www.blackhat.com/docs/eu-16/...ext-Hiding.pdf

    https://www.blackhat.com/docs/eu-16/...-Hiding-wp.pdf

    CYBER JUDO: OFFENSIVE CYBER DEFENSE

    https://www.blackhat.com/docs/eu-16/...er-Defense.pdf

    DETACH ME NOT - DOS ATTACKS AGAINST 4G CELLULAR USERS WORLDWIDE FROM YOUR DESK

    https://www.blackhat.com/docs/eu-16/...ach-Me-Not.pdf

    DRAMA: HOW YOUR DRAM BECOMES A SECURITY PROBLEM

    https://www.blackhat.com/docs/eu-16/...ty-Problem.pdf

    https://www.blackhat.com/docs/eu-16/...Problem-wp.pdf

    EFFECTIVE FILE FORMAT FUZZING – THOUGHTS TECHNIQUES AND RESULTS

    https://www.blackhat.com/docs/eu-16/...nd-Results.pdf

    EGO MARKET: WHEN PEOPLE'S GREED FOR FAME BENEFITS LARGE-SCALE BOTNETS

    https://www.blackhat.com/docs/eu-16/...le-Botnets.pdf

    https://www.blackhat.com/docs/eu-16/...Botnets-wp.pdf

    FLIP FENG SHUI: ROWHAMMERING THE VM'S ISOLATION

    https://www.blackhat.com/docs/eu-16/...-Isolation.pdf

    https://www.blackhat.com/docs/eu-16/...olation-wp.pdf

    GHOST IN THE PLC: DESIGNING AN UNDETECTABLE PROGRAMMABLE LOGIC CONTROLLER ROOTKIT

    https://www.blackhat.com/docs/eu-16/...er-Rootkit.pdf

    https://www.blackhat.com/docs/eu-16/...Rootkit-wp.pdf

    GPU SECURITY EXPOSED

    https://www.blackhat.com/docs/eu-16/...ty-Exposed.pdf

    HOW TO FOOL AN ADC PART II OR HIDING DESTRUCTION OF TURBINE WITH A LITTLE HELP OF SIGNAL PROCESSING

    https://www.blackhat.com/docs/eu-16/...Processing.pdf

    I KNOW WHAT YOU SAW LAST MINUTE - THE CHROME BROWSER CASE

    https://www.blackhat.com/docs/eu-16/...owser-Case.pdf

    https://www.blackhat.com/docs/eu-16/...er-Case-WP.pdf

    INSIDE WEB ATTACKS: THE REAL PAYLOADS

    LOCKNOTE: CONCLUSIONS AND KEY TAKEAWAYS FROM BLACK HAT EUROPE 2016

    MOBILE ESPIONAGE IN THE WILD: PEGASUS AND NATION-STATE LEVEL ATTACKS

    https://www.blackhat.com/docs/eu-16/...el-Attacks.pdf

    NARCOS COUNTERFEITERS AND SCAMMERS: AN APPROACH TO VISUALIZE ILLEGAL MARKETS

    https://www.blackhat.com/docs/eu-16/...al-Markets.pdf

    POCKET-SIZED BADNESS: WHY RANSOMWARE COMES AS A PLOT TWIST IN THE CAT-MOUSE GAME

    https://www.blackhat.com/docs/eu-16/...Mouse-Game.pdf

    RANDOMIZATION CAN'T STOP BPF JIT SPRAY

    https://www.blackhat.com/docs/eu-16/...-JIT-Spray.pdf

    https://www.blackhat.com/docs/eu-16/...T-Spray-wp.pdf

    REAL-WORLD POST-QUANTUM CRYPTOGRAPHY: INTRODUCING THE OPENQUANTUMSAFE SOFTWARE PROJECT
    ROOTING EVERY ANDROID: FROM EXTENSION TO EXPLOITATION

    https://www.blackhat.com/docs/eu-16/...ploitation.pdf

    https://www.blackhat.com/docs/eu-16/...itation-wp.pdf

    SIGNING INTO ONE BILLION MOBILE APP ACCOUNTS EFFORTLESSLY WITH OAUTH2.0

    https://www.blackhat.com/docs/eu-16/...th-OAuth20.pdf

    https://www.blackhat.com/docs/eu-16/...OAuth20-wp.pdf

    STUMPING THE MOBILE CHIPSET

    https://www.blackhat.com/docs/eu-16/...le-Chipset.pdf

    https://www.blackhat.com/docs/eu-16/...Chipset-wp.pdf

    TALKING BEHIND YOUR BACK: ATTACKS AND COUNTERMEASURES OF ULTRASONIC CROSS-DEVICE TRACKING

    https://www.blackhat.com/docs/eu-16/...e-Tracking.pdf

    TOWARDS A POLICY-AGNOSTIC CONTROL-FLOW INTEGRITY IMPLEMENTATION

    https://www.blackhat.com/docs/eu-16/...ementation.pdf
    USE-AFTER-USE-AFTER-FREE: EXPLOIT UAF BY GENERATING YOUR OWN

    https://www.blackhat.com/docs/eu-16/...g-Your-Own.pdf

    https://www.blackhat.com/docs/eu-16/...our-Own-wp.pdf

    WHEN VIRTUALIZATION ENCOUNTER AFL: A PORTABLE VIRTUAL DEVICE FUZZING FRAMEWORK WITH AFL

    https://www.blackhat.com/docs/eu-16/...k-With-AFL.pdf

    https://www.blackhat.com/docs/eu-16/...ith-AFL-wp.pdf

    WIFI-BASED IMSI CATCHER

    https://www.blackhat.com/docs/eu-16/...SI-Catcher.pdf

    WITCHCRAFT COMPILER COLLECTION: TOWARDS SELF AWARE COMPUTER PROGRAMS

    https://www.blackhat.com/docs/eu-16/...r-Programs.pdf

    https://www.blackhat.com/docs/eu-16/...rograms-wp.pdf

    Nguồn: Blackhat.com
     
    Last edited by a moderator: 08/11/16, 02:11 PM
    Mời các bạn tham gia Group WhiteHat để thảo luận và cập nhật tin tức an ninh mạng hàng ngày.
    Lưu ý từ WhiteHat: Kiến thức an ninh mạng để phòng chống, không làm điều xấu. Luật pháp liên quan