BlackHatAbuDhabi 2010 Nov. 8, 2010 to Nov. 11, 2010, Emirates Palace, Abu Dhabi

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote Speaker Peiter "mudge" Zatko N/A
NCIS Child Exploitation Investigations and Operations Kay Een This presentation will cover current trends related to Child Exploitation via the Internet and investigative ...
Blitzableiter - Securing Adobe Flash Fx The talk presents a simple but effective approach for securing Adobe Flash content before using ...
Base Jumping: Attacking GSM Base Station Systems and Mobile Phone Base Bands The Grugq Recent technological advances have placed GSM tools within the reach of today's security researchers and ...
RFID Enabled Passports and Government ID Documents Lukas Grunwald This presentation is showing some risk of the use of "Insecure" RFID implementation on Passports ...
HTTPS Can Byte Me Robert J. Hansen HTTPS was created to protect confidentiality and prove integrity of content passed over the web. ...
CLOUDINOMICON: Idempotent Infrastructure, Survivable Systems & Bringing Sexy Back to Information Centricity Christopher Hoff Mass-market, low-cost, commodity infrastructure-as-a-Service Cloud Computing providers abstract away compute, network and storage and deliver ...
Jackpotting Automated Teller Machines Redux Barnaby Jack The presentation "Jackpotting Automated Teller Machines" was originally on the schedule at Black Hat USA ...
Owning the Unknown: Applying Lockpicking Fundamentals to Unknown Security Models Babak Javadi In recent years, there has been a great deal of talk regarding lockpicking methods and ...
DNSSec Dan Kaminsky Introducing the Domain Key Infrastructure X509 based PKI failed. We know this. But it's still ...
Attacking with HTML5 Lavakumar Kuppan HTML5 is a set of powerful features aimed at moving the web applications closer to ...
Mobile Phony: Why You Cant Trust Mobile Phone Networks For Critical Infrastructure Zane Lackey , Don Bailey This presentation will cover the inherent flaws in the mobile telephony network that affect everything ...
RFID Security Adam ( Major Malfunction ) Laurie RFID is being heralded as the answer to many security problems, such as access control, ...
Database Forensics David Litchfield N/A
Changing Threats To Privacy: From TIA To Google Moxie Marlinspike A lot has changed since discussions around digital privacy began. The security community won the ...
Building Android Sandcastles in Android's Sandbox Nils The well-known way of breaking out of the Android sandbox is using a recent local ...
Attacking Phone Privacy Karsten Nohl Our most popular phone technologies use decade-old proprietary cryptography. GSM's 64bit A5/1 cipher, for instance, ...
Extrusion and Web Hacking Laurent Oudot This technical talk will focus on web attackers and how they try to handle extrusion ...
Malware Attribution for Fun, Fame, Profit and War? Laurent Oudot Recent incidents commonly thought to be linked to state sponsored activities have given rise to ...
Electricity for Free? The Dirty Underbelly of SCADA and Smart Meters Jonathan Pollet , Joe Cummins SCADA Systems control the generation, transmission, and distribution of electric power, and Smart Meters are ...
International Cyber Jurisdiction: Kill Switching Tiffany Rad Cyberspace, Cyber Criminal Prosecution & Jurisdiction Hopping Concepts of sovereignty, freedom, privacy and intellectual property ...
Escaping the Sandbox Stephen A. Ridley As many have predicted, 2010 will be the Year of the Sandbox. We will probably ...
State of SSL on the Internet: 2010 Survey, Results and Conclusions Ivan Ristic SSL (TLS) is the technology that protects the Internet, but very little is actually known ...
Lifting the Fog Dominic White Cloud services continue to proliferate and new users continue to flock, in a clear demonstration ...