BlackHatAsia 2015 March 24, 2015 to March 25, 2015, Marina Bay,Singapore
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
INFORMATION TECHNOLOGY SYSTEMS IN A POST-SILICON WORLD | Bernard S. Meyerson | As an industry we have counted on a steady drumbeat of technology advances to drive ... | |
LOCKNOTE: CONCLUSIONS AND KEY TAKEAWAYS FROM BLACK HAT ASIA 2015 | Jeff ( Dark Tangent ) Moss | At the close of this year's conference, join Black Hat Founder Jeff Moss and members ... | |
(IN)SECURITY OF MOBILE BANKING | Eric Filiol , Paul Irolla | Mobile banking is about to become the de facto standard for banking activities. Banking apps ... | |
API DEOBFUSCATOR: IDENTIFYING RUNTIME-OBFUSCATED API CALLS VIA MEMORY ACCESS ANALYSIS | Seokwoo Choi | API wrapping technique is commonly used among malwares and code obfuscators. One of the advanced ... | |
ATTACKING SAP MOBILE | Dmitry Chastuhin , Vahagn Vardanyan | Have you ever thought how to get access to the most influential data stored on ... | |
BAR-MITZVA ATTACK: BREAKING SSL WITH 13-YEAR OLD RC4 WEAKNESS | Itsik Mantin | RC4 is the most popular stream cipher in the world, and in particular is used ... | |
BROWSERS GONE WILD | Angelo Prado , Xiaoran Wang | In this talk, we will demonstrate and unveil the latest developments on browser specific weaknesses ... | |
BYPASSING MALWARE DETECTION MECHANISMS IN ONLINE BANKING | Jakub Kaluzny , Mateusz Olejarka | Online banking applications are particularly exposed to malware attacks. To minimize losses, banks have invested ... | |
CLIENT-SIDE PROTECTION AGAINST DOM-BASED XSS DONE RIGHT (TM) | Martin Johns , Ben Stock , Sebastian Lekies | Cross-Site Scripting (XSS) is one of the most severe security vulnerabilities of the web. With ... | |
DABID: THE POWERFUL INTERACTIVE ANDROID DEBUGGER FOR ANDROID MALWARE ANALYSIS | Jieun Lee , Jin-hyuk Jung | Android malware are getting complicated with advanced code protection technologies such as obfuscation, packing, bytecode ... | |
DECENTRALIZED MALWARE ON THE BLOCKCHAIN | Vitaly Kamluk , Christian Karam | The blockchain is the public ledger stacking all bitcoin/altcoins transactions. It is constantly growing as ... | |
EXPLOITING SOCIAL NAVIGATION | Nimrod Partush , Meital Ben Sinai , Shir Yadid | We present two new attacks against social navigation services. These attacks are based on creating ... | |
FORGING THE USB ARMORY | Andrea Barisani | The availability of modern System on a Chip (SoC) parts, having low power consumption and ... | |
FROM ZERO TO SECURE IN ONE MINUTE | Nir Valtman , Moshe Ferber | Cloud instances lifecycles are changing fast and forces us to improve the way we secure ... | |
HACKING THE WIRELESS WORLD WITH SOFTWARE DEFINED RADIO - 2.0 | Balint Seeber | Ever wanted to communicate with a NASA space probe launched in 1978, or spoof a ... | |
HIDING BEHIND ANDROID RUNTIME (ART) | Paul Vincent Sabanal | The introduction of the new Android Runtime (ART) brings several improvements in Android. But, as ... | |
HOPPING ON THE CAN BUS | Eric Evenchick | Controller Area Network (CAN) is found in a number of systems, and is the main ... | |
I KNOW WHERE YOU'VE BEEN: GEO-INFERENCE ATTACKS VIA THE BROWSER CACHE | Yaoqi Jia | Numerous websites customize their services according to different geo-locations of users, to provide more relevant ... | |
MLD CONSIDERED HARMFUL - BREAKING ANOTHER IPV6 SUBPROTOCOL | Antonios Atlasis , Rafael Schaefer , Jayson Salazar | Multicast Listener Discovery (MLD) and its successor, MLDv2, is a protocol of the IPv6 suite ... | |
NEXT LEVEL CHEATING AND LEVELING UP MITIGATIONS | Joel St. John , Nicolas Guigo | Cheaters are a growing problem in multiplayer gaming. As games become increasingly complex, the level ... | |
RELAYING EMV CONTACTLESS TRANSACTIONS USING OFF-THE-SHELF ANDROID DEVICES | Jordi Breekel | We present the first vulnerabilities in EMV (Europay, MasterCard and Visa) Contactless that do not ... | |
RESURRECTING THE READ_LOGS PERMISSION ON SAMSUNG DEVICES | Angelos Stavrou , Ryan Johnson | We have discovered an attack that allows a non-privileged application to continually force the generation ... | |
SECURITY CONTENT METADATA MODEL WITH AN EFFICIENT SEARCH METHODOLOGY FOR REAL TIME MONITORING AND THREAT INTELLIGENCE | Preeti Subramanian | The Security Content Automation Protocol (SCAP) federates a number of open standards that are used ... | |
SLIME: AUTOMATED ANTI-SANDBOXING DISARMAMENT SYSTEM | Yosuke Chubachi , Kenji Aiko | Recently, a malware is constantly growing which forces malware analysts into hard work. An automated ... | |
THE NIGHTMARE BEHIND THE CROSS PLATFORM MOBILE APPS DREAM | Sebastian Guerrero , Marco Grassi | A large part of the mobile applications in the store are developed leveraging frameworks for ... | |
THE UNDERGROUND ECOSYSTEM OF CREDIT CARD FRAUDS | Abhinav Singh | Point of Sale (POS) malwares have been stealing the limelight this year. They have been ... | |
UNDERSTANDING SCADA'S MODBUS PROTOCOL | Justin Searle | Join Justin Searle for a two-hour workshop where he'll take you through the modbus network ... |