BlackHatAbuDhabi 2011 Dec. 14, 2011 to Dec. 15, 2011, Emirates Palace, Abu Dhabi

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote:Cyber Security and Cyber Threats in a Changing World Michael v. Hayden N/A
Cryptanalysis vs. Reality Jean-Philippe Aumasson It is commonplace to argue that academic cryptanalysis---whose "attacks" literally take billions of years to ...
Fun with Google Custom Searches: Intelligence, Secrets and Leaks Jamal Bandukwala Traditional Google searches can generate millions of results many of which are not relevant to ...
Force Multipliers on the Modern Battlefield Brad Barker In today's business environment, communication tools have made fast-paced business environment incredibly efficient as more ...
Financial Armageddon? Inside the Zeus and SpyEye Tidal Wave Ken Baylor Financial malware is causing banks to lose hundreds of millions of dollars per year. This ...
Taming Worms, RATs, Dragons and More! Christiaan Beek Over years the use of malware has dramatically changed. Ranging from programmers exploring the malicious ...
Evolution of iOS Data Protection and iPhone Forensics: from iPhoneOS to iOS 5 Dmitry Sklyarov , Andrey Belenko iOS 5 is the latest and most advanced mobile OS from Apple. Besides tweaking UI ...
Cybercrime and Organized Crime Francesca Bosco The opportunities granted by the Internet have transformed many legitimate business ventures by streamlining their ...
Legal Aspects of Cybersecurity Robert Clark The presentation is a year in review of important legal issues involving cybersecurity, computer network ...
Android : From Reversing to Decompilation Anthony Desnos , Geoffroy Gueguen This talk deals with Android's bytecode analysis. The Android system is now widespread, and lots ...
Exploiting Memory Corruption Vulnerabilities in the Java Runtime Joshua j. Drake The Oracle (previously Sun) Java Runtime Environment (JRE) is widely viewed by security researchers as ...
Virtualization Under Attack: Breaking out of KVM Nelson Elhage KVM, the Linux Kernel Virtual Machine, seems destined to become the dominant open-source virtualization solution ...
Check Your Zombie Devices! : Analysis of the DDoS Cyber Terrorism Against the Country and Future Attacks on Various Devices Dongjoo Ha , Sangmyung Choi , Taehyung Kim , Seungyoun Han A Distributed Denial-of-Service(DDoS), one of the simplest and most powerful cyber attacks is a big ...
Life Threatening Vulnerabilities Barnaby Jack Diabetes currently affects 285 million people worldwide which is 6.4% of the population. This number ...
New Ways I'm Going to Hack Your Web App Rich Lundeen , Jesse Ou , Travis Rhodes Writing secure code is hard. Even when people do it basically right there are sometimes ...
Stealth Attacks - Detection and Investigation Ryan Jones , Thomas Mackenzie Meticulous attackers can subvert audit controls to the point where a compromise is almost undetectable. ...
iSnoop: How to Steal Secrets From Touchscreen Devices Stefano Zanero , Federico Maggi , Alberto Volpatto Spying on a person is an easy and effective method to obtain sensitive informations, even ...
Kautilya: Teensy Beyond Shell Nikhil Mittal As hackers, we have been exploiting the inherent trust by Operating System on Human Interface ...
From Redmond with Love! Katie Moussouris In 2008, people thought we'd lost our minds when we announced three strategic programs: sharing ...
Yet Another Android Rootkit - /Protecting/System/Is/Not/Enough/ Tsukasa Oi Android devices have been repeatedly hacked for root privileges. Sometimes by malware authors, and sometimes ...
Introduction to More Advanced Steganography John Ortiz Steganography has advanced tremendously in the last few years and simple concepts have even been ...
WORKSHOP: Advanced Wi-Fi Security Penetration Testing Vivek Ramachandran This workshop will provide a highly technical and in-depth treatment of Wi-Fi security. The emphasis ...
SCADA Security - Why Is It So Hard? Amol Sarwate This talk will present technical security challenges faced by organizations that have SCADA or control ...
Software Security Goes Mobile Russell Spitler Mobile devices and the risk posed by vulnerabilities in the software that runs them are ...
Determining Personality Traits & Privacy Concerns from Facebook Activity Chris Sumner , Adrian M , Alison Byers This study explored the extent to which it is possible to predict personality traits and ...
Corporate Espionage for Dummies: The Hidden Threat of Embedded Web Servers Michael Sutton Today, everything from television sets to photocopiers have an IP address and an embedded web ...