Blackhat USA 2002 July 1, 2002 to July 2, 2002, Las Vegas, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Hacker Court Richard Thieme , Kevin Manson , Simple Nomad , Carole Fennelly , Rebecca Bace , Jonathan Klein , Brian Martin , Don Cavender , Jesse Kornblum , Richard P. Salgado , Jennifer Granick Security Panel
Ip Backbone Security Nicolas Fischbach , Sébastien Lacoste-séris None Security Routing Infrastructure
Graph-Based Binary Analysis Thomas ( Halvar Flake ) Dullien None Security Deep Knowledge
Attacking Networked Embedded Systems Felix ( FX ) Lindner , Kim0 None Security Routing Infrastructure
Views On The Future Direction Of Information Assurance Richard George None Security Luncheon Speaker
Jd'S Toolbox: Fire & Water Jd Glaser None Security Application Security
Off-The-Record Messaging Ian Goldberg None Security Anonymity Privacy
Securing Your Computing Environment To Conform To Privacy Regulations Robert Marotta , David Goldman None Security Anonymity Privacy
Web Application Security: Stuff Your Mother Never Told You Bill Pennington , Dennis Groves None Security Web Mail DNS Others
Hogwash Jed Haile None Security Firewall Access Control
Dc Phone Home Aaron Higbee , Christopher Davis None Security Deep Knowledge
Application Testing Through Fault Injection Techniques Greg Hoglund Security Application Security
Enterprise Email Security Made Practical Paul Holman None Security Web Mail DNS Others
Phase Ii - 2Nd Generation Honeynet Technologies The Honeynet Project None Security Computer Forensics
Non-Obvious Relationship Awareness (Nora) Technology Jeff Jonas None Security Luncheon Speaker
Black Ops Of Tcp/Ip: Spliced Nat2Nat And Other Packet-Level Misadventures None Deep Knowledge Security
Single Sign-On 101: Beyond The Hype - What Sso Can, And Can’T Do For Your Business Diana Kelley , Ian Poynter None Security Firewall Access Control
Dynamic Routing Inside Ipsec Vpns - New Threats And Defenses Paul Knight None Security Routing Infrastructure
Building A Global Early Warning System For Internet Attacks Oliver Friedrichs , Elias Levy None Computer Forensics Security
Database Security - The Pot And The Kettle. David Litchfield None Security Web Mail DNS Others
Vulnerability Disclosure: What The Feds Think Tom Parker , Richard George , Michael I. Morgenstern , Marcus H. Sachs , O. Sami Saydjari , Steve Lipner None Security Panel
Neutralizing Nimda: Technical, Moral, And Legal Discussions Of An Automated Strike-Back Timothy ( Thor ) Mullen None Security Computer Forensics
Locking Down Your Freebsd Install Rich Murphey None Security Routing Infrastructure
802.1X - What It Is, Why It'S Broken, And How To Fix It Bruce Potter None Security Wireless
Novell: The Forgotten Os Rain Forest Puppy None Security Application Security
Forensic Dead-Ends: Tracing Users Through Anonymous Remailers Len Sassaman Security Anonymity Privacy
The Need For An 802.11B Toolkit Mike ( Route ) D. Schiffman None Security Wireless
Security Aspects In Java Bytecode Engineering: A Tutorial Marc Schönefeld None Security Application Security
Scene Of The Cybercrime: Assisting Law Enforcement In Tracking Down And Prosecuting Cybercriminals Debra Littlejohn Shinder None Security Computer Forensics
The Biometrics Dilemma Rick Smith None Security Firewall Access
Setiri: Advances In Trojan Technology Roelof ( RT ) Temmingh , Haroon Meer Security Firewall Access
Wireless Overview: Protocols And Threat Models Dan Veeneman None Security Wireless
Vulnerabilities Of Cellular And Satellite-Based Voice And Data Networks Dan Veeneman None Security Wireless
Web Application Brute Forcing 101 – “Enemy Of The State (Mechanism)” David Endler , Michael Sutton None Security Web Mail DNS Others
The Usa Patriot Act And Criminal Investigations: What Service Providers Need To Know Mark Eckenwiler None Security Anonymity Privacy
Putting 2 And 2 Together: Designing Security Into Your Network Infrastructure Stephen Dugan None Security Routing Infrastructure
Professional Source Code Auditing Thomas ( Halvar Flake ) Dullien , Mark Dowd , Nishad Herath , Neil Mehta , Chris Spencer None Security Deep Knowledge
Why Is Anonymity So Hard? Roger Dingledine Security Anonymity Privacy
Hacking Layer 2: Fun With Ethernet Switches Sean Convery None Security Routing Infrastructure
Fixing/Making Holes In Binaries: The Easy, The Hard, The Time Consuming Shaun Clowes None Security Application Security
National Strategy For Securing Cyberspace Richard Clarke None Security Keynote
Security Event Correlation – Security'S Holy Grail? Matthew Caldwell None Security Computer Forensics
Syscall Proxying - Simulating Remote Execution Maximiliano Caceres None Deep Knowledge Security
Politics Of Vulnerability Reporting Scott Blake None Security Web Mail DNS Others
Attacking And Securing Unix Ftp Servers Jay Beale None Security Web Mail DNS Others
Advanced 802.11B Attack Robert Baird , Mike Lynn None Security Wireless
Cracking Voip Architecture Based On The Session Initiation Protocol (Sip) Ofir Arkin None Security Routing Infrastructure
Cisco Router Forensics Thomas Akin None Security Computer Forensics
An Introduction To Spike, The Fuzzer Creation Kit Dave Aitel None Security