BlueHat 2014 Oct. 9, 2014 to Oct. 10, 2014, Redmond,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Botintime - Phoenix: DGA-based Botnet Tracking and Intelligence Stefano Zanero Its common knowledge that a malicious domain automatically generated will not become popular and also ... IncludeThinkstScapes
Government Snooping Potentially Now Constitutes an Advance Persistent Threat Scott Longheyer Security is the application of Privacy’s intentions, so open the pocketbook and check your ciphers. ...
Jackdaw talk - Automatic Malware Behavior Extraction and Tagging Stefano Zanero This talk will focus on our approach for extracting (interesting) behavior specifications in an automatic ...
UEFI - What would it take to enable global firmware vulnerability & integrity checking? Xeno Kovah This talk will describe what actions are being taken to improve security for PC firmware, ...
UEFI - Summary of Attacks against BIOS and Secure Boot Yuriy Bulygin A variety of attacks targeting platform firmware have been discussed publicly, drawing attention to the ...
Behind the NDA: How to attack a product under deadline Josh m0nk Thomas This talk will focus on a brief security assessment of the Windows Phone / Nokia ...
Defining and Enforcing Intent Semantics at ABI level Sergey Bratus , Julian Bangert Dominant OS security policy designs treat a process as an opaque entity that has a ...
Build It Break It Competition Andrew Ruef We created a competition where students design and implement secure programs, and identify bugs in ...
Subverting machine learning detections for fun and profit John Walton , Ram Kumar If you are using Machine learning in your feature, it can be attacked! This talk ... IncludeThinkstScapes
The Attacker's View of Windows Authentication and Post Exploitation part 1 Benjamin Delpy , Chris Campbell , Skip Duckwall This talk will focus on the how Windows authentication works in the real world and ...
The Attacker's View of Windows Authentication and Post Exploitation part 2 Benjamin Delpy , Chris Campbell , Skip Duckwall N/A
Privacy and Security in a Personalized Services World Ho John Lee An introduction and discussion of current policy issues around personalized mobile and cloud-based knowledge services. ...
The failure and success in IE fuzzing Bo Qu The road to success is often paved with failure. In this presentation we will discuss ...
Next Generation Advanced Persistent Threat™ John Walton What will tomorrow’s threat landscape, look like? How can attacks become even more advanced than ...
Fighting Cybercrime with Big Data David Finn The Microsoft Digital Crimes Unit (“DCU”) is a team of about 100 people, including former ...
Data Isolation In Multitenant Cloud Environment Alexandra Savelieva , Daniel Eshner , Nuwan Ginige , Mohammad Usman In our talk, you’ll learn about a new solution that we built to address the ...