bluehat 2018 Jan. 23, 2018 to Jan. 24, 2018, sheva,tel aviv
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Fake News and Info-Ops: Modern Information Warfare,and What to Do About It | Matt Tait | In the Summer of 2016, the U.S. was rocked by a huge disinformation campaign orchestrated ... | |
Active Directory: What Can Make Your Million Dollar SIEM Go Blind? | Benjamin Delpy , Vincent Le Toux | Active Directory is a key element for security and is a primary target in most ... | |
Attribution 2.0: When Code Reuse Brings Down the House of Cards | Costin Raiu | In June 2016, Motherboard’s Lorenzo Franceschi-Bicchierai interviewed the alleged DNC (hacker Guccifer 2.0. When asked ... | |
Born Secure. How to Design a Brand New Cloud Platform with a Strong Security posture | Lee Holmes | What if you could design a sealed, cloud infrastructure starting from a clean slate? What ... | |
Browser Security Beyond Sandboxing | Jordan Rabet | Security is now a strong differentiator in picking the right browser - a single compromise ... | |
Computers Gone Rogue: Abusing Computer Accounts to Gain Control in an Active Directory Environment | Itai Grady , Marina Simakov | Active Directory has always been a lucrative target for attackers since it serves as the ... | |
eMMC Hacking, Or: How I Fixed Long-Dead Galaxy S3 Phones | Oran Avraham | A few years ago Samsung Galaxy S3 devices started dying all around the world (a ... | |
Ethereum VM, Bytecode & Bugged Smart-Contracts | Matt Suiche | In this talk we will explore the Ethereum Virtual Machine (EVM) architecture, explore its smart-contract ... | |
Extracting Secrets from Silicon – A New Generation of Bug Hunting | Gunter Ollmann | As reverse engineering tools and hacking techniques have improved over the years, software engineers have ... | |
Hi, My Name is "CN=Microsoft Windows, O=Microsoft Corporation, L=Redmond, S=Washington, C=US" | Matt Graeber | In the context of computer security, what is trust and what does it mean to ... | |
KRACKing WPA2 in Practice Using Key Reinstallation Attacks | Mathy Vanhoef | This talk presents the key reinstallation attack. It abuses design or implementation flaws in cryptographic ... | |
Linux Vulnerabilities, Windows Exploits: Escalating Privileges with WSL | Saar Amar | WSL (Windows Subsystem for Linux) is an impressive mechanism integrated recently into the Windows 10 ... | |
New and Improved UMCI, Same Old Bugs | James Forshaw | User Mode Code Integrity (UMCI) restricts what executables can be run based on the signer. ... | |
Terrorist Phone Unlocking 101 | Shahar Tal , Gil Kaminker | The widely misreported realm of mobile phone unlocking and forensic extraction has significantly developed in ... | |
The New Paradigm of Security Controls | John Lambert | We are seeing a new approach to security that is rippling across network defenders, products, ... | |
The Wolf in SGX Clothing | Marion Marschalek | SGX is a security technology, which is designed to hide secrets from the very platform ... | |
Windows: Hardening with Hardware | David Weston | The security features of modern PC hardware are enabling new trust boundaries and attack resistance ... |