BlueHatIL 2020 Feb. 5, 2020 to Feb. 5, 2020, Tel Aviv, Israel

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
ATTOR: Spy Platform with Curious GSM Fingerprinting Zuzana Hromcova ATTOR is a previously unreported espionage platform used in targeted attacks, focusing on diplomatic missions ...
Bugs on the Windshield: Fuzzing the Windows Kernel Netanel Alon The mere existence of fuzzers is not breaking news, as they’ve been around for more ...
CDPwn: Taking Over Millions of Enterprise-Things with Layer 2 Zero-days Ben Sarel The attack surface exposed by proprietary layer 2 protocols is rarely explored by the research ...
Exploiting Errors in Windows Error Reporting Gal De Leon One of the most common types of vulnerabilities fixed in the last year or so ...
Forget the Sandbox Escape: Abusing Browsers from Code Execution Amy Burnett The complexity of JavaScript and Web APIs has led to an increase in vulnerabilities found ...
Geneva: An AI Approach to Evading Nation-State Censorship Kevin Thursday , Feb 06 , 12:15-12:45 Pm Nation-state censorship is one of the greatest threats to free and open communication. For years, ...
Internals & Weaknesses of the DPAPI for the Protection of Our Data on Windows Benjamin Delpy DPAPI has been already discussed, but how does it work? Internally?How can you use or ...
Keeping Windows Secure David Weston This talk will provide a unique view into the massive challenges tackled in securing the ...
Retrospective on the Latest Zero-days Found in the Wild Boris Larin In just one year – from December 2018 to December 2019 – we found five ...
Staying # and Bringing Covert Injection Tradecraft to .NET The Boonen As .NET has taken over as the preferred platform for development on Windows, many attackers ...
syzkaller: Adventures in Continuous Coverage-guided Kernel Fuzzing Dmitry Vyukov syzkaller is an open-source, coverage-guided, structure-aware kernel fuzzer with strong accent on automation, currently supported ...
Tactics, Techniques, and Procedures of the World’s Most Dangerous Attackers Robert Lipovsky In the recent years, we have analyzed some of the most significant cyberattacks in history. ...
The One Weird Trick SecureROM Hates Luca Todesco (@qwertyoruiop) Checkm8 is an unfixable vulnerability present in hundreds of millions of iPhones, in SecureROM - ...
Trinity: PSP Emulator Escape Andy Nguyen The PlayStation Vita is the successor to the PlayStation Portable (PSP) and has been one ...
We Can't Stop Here! This is Bot Country! Nate Warfield Every day the internet is scanned & probed by a quarter of a million IP ...
Where's Waldo...'s Brothers and Sisters: Variant Analysis on Recent 0-days Maddie Stone When 0-day exploits are used in the wild, vendors and the security community often focus ...