BlackHatAsia 2015 March 24, 2015 to March 25, 2015, Marina Bay,Singapore

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
INFORMATION TECHNOLOGY SYSTEMS IN A POST-SILICON WORLD Bernard S. Meyerson As an industry we have counted on a steady drumbeat of technology advances to drive ...
LOCKNOTE: CONCLUSIONS AND KEY TAKEAWAYS FROM BLACK HAT ASIA 2015 Jeff ( Dark Tangent ) Moss At the close of this year's conference, join Black Hat Founder Jeff Moss and members ...
(IN)SECURITY OF MOBILE BANKING Eric Filiol , Paul Irolla Mobile banking is about to become the de facto standard for banking activities. Banking apps ...
API DEOBFUSCATOR: IDENTIFYING RUNTIME-OBFUSCATED API CALLS VIA MEMORY ACCESS ANALYSIS Seokwoo Choi API wrapping technique is commonly used among malwares and code obfuscators. One of the advanced ...
ATTACKING SAP MOBILE Dmitry Chastuhin , Vahagn Vardanyan Have you ever thought how to get access to the most influential data stored on ...
BAR-MITZVA ATTACK: BREAKING SSL WITH 13-YEAR OLD RC4 WEAKNESS Itsik Mantin RC4 is the most popular stream cipher in the world, and in particular is used ...
BROWSERS GONE WILD Angelo Prado , Xiaoran Wang In this talk, we will demonstrate and unveil the latest developments on browser specific weaknesses ...
BYPASSING MALWARE DETECTION MECHANISMS IN ONLINE BANKING Mateusz Olejarka , Jakub Kaluzny Online banking applications are particularly exposed to malware attacks. To minimize losses, banks have invested ...
CLIENT-SIDE PROTECTION AGAINST DOM-BASED XSS DONE RIGHT (TM) Martin Johns , Ben Stock , Sebastian Lekies Cross-Site Scripting (XSS) is one of the most severe security vulnerabilities of the web. With ...
DABID: THE POWERFUL INTERACTIVE ANDROID DEBUGGER FOR ANDROID MALWARE ANALYSIS Jin-hyuk Jung , Jieun Lee Android malware are getting complicated with advanced code protection technologies such as obfuscation, packing, bytecode ...
DECENTRALIZED MALWARE ON THE BLOCKCHAIN Vitaly Kamluk , Christian Karam The blockchain is the public ledger stacking all bitcoin/altcoins transactions. It is constantly growing as ...
EXPLOITING SOCIAL NAVIGATION Nimrod Partush , Meital Ben Sinai , Shir Yadid We present two new attacks against social navigation services. These attacks are based on creating ...
FORGING THE USB ARMORY Andrea Barisani The availability of modern System on a Chip (SoC) parts, having low power consumption and ...
FROM ZERO TO SECURE IN ONE MINUTE Nir Valtman , Moshe Ferber Cloud instances lifecycles are changing fast and forces us to improve the way we secure ...
HACKING THE WIRELESS WORLD WITH SOFTWARE DEFINED RADIO - 2.0 Balint Seeber Ever wanted to communicate with a NASA space probe launched in 1978, or spoof a ...
HIDING BEHIND ANDROID RUNTIME (ART) Paul Vincent Sabanal The introduction of the new Android Runtime (ART) brings several improvements in Android. But, as ...
HOPPING ON THE CAN BUS Eric Evenchick Controller Area Network (CAN) is found in a number of systems, and is the main ...
I KNOW WHERE YOU'VE BEEN: GEO-INFERENCE ATTACKS VIA THE BROWSER CACHE Yaoqi Jia Numerous websites customize their services according to different geo-locations of users, to provide more relevant ...
MLD CONSIDERED HARMFUL - BREAKING ANOTHER IPV6 SUBPROTOCOL Antonios Atlasis , Rafael Schaefer , Jayson Salazar Multicast Listener Discovery (MLD) and its successor, MLDv2, is a protocol of the IPv6 suite ...
NEXT LEVEL CHEATING AND LEVELING UP MITIGATIONS Joel St. John , Nicolas Guigo Cheaters are a growing problem in multiplayer gaming. As games become increasingly complex, the level ...
RELAYING EMV CONTACTLESS TRANSACTIONS USING OFF-THE-SHELF ANDROID DEVICES Jordi Breekel We present the first vulnerabilities in EMV (Europay, MasterCard and Visa) Contactless that do not ...
RESURRECTING THE READ_LOGS PERMISSION ON SAMSUNG DEVICES Angelos Stavrou , Ryan Johnson We have discovered an attack that allows a non-privileged application to continually force the generation ...
SECURITY CONTENT METADATA MODEL WITH AN EFFICIENT SEARCH METHODOLOGY FOR REAL TIME MONITORING AND THREAT INTELLIGENCE Preeti Subramanian The Security Content Automation Protocol (SCAP) federates a number of open standards that are used ...
SLIME: AUTOMATED ANTI-SANDBOXING DISARMAMENT SYSTEM Kenji Aiko , Yosuke Chubachi Recently, a malware is constantly growing which forces malware analysts into hard work. An automated ...
THE NIGHTMARE BEHIND THE CROSS PLATFORM MOBILE APPS DREAM Sebastian Guerrero , Marco Grassi A large part of the mobile applications in the store are developed leveraging frameworks for ...
THE UNDERGROUND ECOSYSTEM OF CREDIT CARD FRAUDS Abhinav Singh Point of Sale (POS) malwares have been stealing the limelight this year. They have been ...
UNDERSTANDING SCADA'S MODBUS PROTOCOL Justin Searle Join Justin Searle for a two-hour workshop where he'll take you through the modbus network ...