BlackHatEurope 2020 Dec. 7, 2020 to Dec. 10, 2020, Virtual, Virtual

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Hacking Government Cybersecurity Pete Cooper This session delivered by Pete Cooper, the Deputy Director for Cyber Defence at the Cabinet ...
Finding Bugs Compiler Knows but Doesn't Tell You: Dissecting Undefined Behavior Optimizations in LLVM Wei Liu , Zekai Wu , Mingyue Liang , Kai Song "Undefined Behavior", like signed integer overflow or accessing null pointer, is an erroneous action that ...
It's not FINished: The Evolving Maturity in Ransomware Operations Mitchell Hall Ransom demands are becoming larger, attackers smarter, and intrusions longer. Ransomware threat actors are hitting ...
Jack-in-the-Cache: A New Code injection Technique through Modifying X86-to-ARM Translation Cache Ko Oshiba Recently, the adoption of ARM processors for laptop computers is becoming popular due to its ...
Shield with Hole: New Security Mitigation Helps Us Escape Chrome Sandbox to Exfiltrate User Privacy Yongke Shi More security mitigations always mean securer software and more exploit cost. Chrome browser keeps introducing ...
A New Hope: The One Last Chance to Save Your SSD Data Taehyun Kim , Taewon Kim , Hanjun Chung , Seungjoon Lee , Kwonyoup Kim There are some reasons why vendors keep their details of controller and flash chip information ...
Graph Convolutional Network-Based Suspicious Communication Pair Estimation for Industrial Control Systems Tatsumi Oba Whitelisting is considered an effective security monitoring method for networks used in industrial control systems, ...
The Subtle Art of Chaining Headers - IKEv2 Attack Surface Case Study Antonios Atlasis Internet Key Exchange (IKE) is a significant component of IP Security (IPsec), a suite of ...
Debug Resurrection on Nordic nRF52 Series N/a Nordic nRF52 System-on-Chips (SoCs) are unquestionably dominating the IoT dedicated platforms market today, especially for ...
From Zero to Sixty: The Story of North Korea's Rapid Ascent to Becoming a Global Cyber Superpower Jason Burgess In a relatively short period of time, North Korea has evolved its offensive cyber capability ...
LadderLeak: Breaking ECDSA with Less than One Bit of Nonce Leakage Diego Takahashi Although one of the most popular signature schemes, ECDSA presents a number of implementation pitfalls, ...
Design Pitfalls in Commercial Mini-Programs on Android and iOS Luyi Xing , Xiaojing Liao , Haoran Lu A new, commercial mobile-computing paradigm, dubbed app-in-app, is gaining high popularity in the past years. ...
Discovering 20 Year Old Vulnerabilities in Modern Windows Kernel Rancho Han With the continuous upgrade by Microsoft, the latest windows 10 version has become more and ...
FPs are Cheap. Show me the CVEs! Bas Backhouse SAST tools are notoriously hard to evaluate and benchmark. The most important thing you want ...
Manufacturing Hardware Implants from Idea to Mass Production: A Hacker's Journey Luca Bongiorni This presentation wants to be a motivational talk for all those hackers out there that ...
efiXplorer: Hunting for UEFI Firmware Vulnerabilities at Scale with Automated Static Analysis Andrey Labunets , Alex Matrosov , Yegor Vasilenko , Philip Lebedev Existing UEFI analysis instruments lack systemic approach to firmware vulnerability research focused on specifics of ...
Hermes Attack: Steal DNN Models In AI Privatization Deployment Scenarios Yueqiang Cheng , Husheng Zhou , Yuankun Zhu The AI privatization deployment is becoming a big market in China and the US. For ...
How Embedded TCP/IP Stacks Breed Critical Vulnerabilities Jos Wetzels , Stanislav Dashevskyi , Daniel Dos Santos , Amine Amri In the past few years, there's been a rise in critical vulnerabilities affecting embedded TCP/IP ...
IAM Concerned: OAuth Token Hijacking in Google Cloud (GCP) Jenko Hwong Imagine you've protected your production Google Cloud environment from compromised credentials, using MFA and a ...
Locknote: Conclusions and Key Takeaways from Day 1 Federico Maggi , Sharon Conheady , Elisabeth Oswald , Thomas Brandstetter Join members of the Black Hat Review Board for an insightful conversation on the most ...
Precursor: Towards Evidence-Based Trust in Hardware Andrew "bunnie" Huang In hardware, the status quo is that we may have faith in our wares, but ...
BinTyper: Type Confusion Detection for C++ Binaries Dongju Kim Type confusion bug (or bad casting) is a popular vulnerability class that attacks C++ software ...
Bypassing NGAV for Fun and Profit Ishai Meir In this talk, we demonstrate the first methodological approach to "reverse engineer" a NGAV model ...
Fingerprint-Jacking: Practical Fingerprint Authorization Hijacking in Android Apps Wing Cheong Lau , Ronghai Yang , Xianbo Wang , Shangcheng Shi , Yikang Chen Many mobile devices carry a fingerprint scanner nowadays. Mobile apps utilize the fingerprint scanner to ...
This is for the Pwners : Exploiting a WebKit 0-day in PlayStation 4 Quentin Talbi Despite an active console hacking community, only few public PlayStation 4 exploits have been released. ...
Effective Vulnerability Discovery with Machine Learning Ming Sharma Software Composition Analysis (SCA) products report vulnerabilities in third-party dependencies by comparing libraries detected in ...
My Ticks Don't Lie: New Timing Attacks for Hypervisor Detection Daniele Cono D'elia Hypervisor detection is a pillar of sandbox evasion techniques. While hardware-assisted virtualization solutions are indispensable ...
POSWorld. Should You be Afraid of Hands-On Payment Devices? Aleksei Yunusov The dark market is full of cloned Point of Sales terminals and offers for fake ...
Portable Data exFiltration: XSS for PDFs Gareth Heyes PDF documents and PDF generators are ubiquitous on the web, and so are injection vulnerabilities. ...
Quantum Security and Cryptography: You Are (Probably) Doing it Wrong Tommaso Gagliardoni Quantum Cryptography is not just Alice and Bob exchanging qubits: There is a whole world ...
The Hunt for Major League IoT-ICS Threats: A Deep Dive into IoT Threat Terrain Mars Kuo Because the Internet of Things is a major part of modern life, security threats are ...
Circumventing the Guardians: How the Security Features in State-of-the-Art TLS Inspection Solutions can be Exploited for Covert Data Exfiltration Morten Malvica In this talk, we will reveal a new stealthy method of data exfiltration that specifically ...
Cross-Site Escape: Pwning macOS Safari Sandbox the Unusual Way Zhi Zhou Sandbox escape plays a vital role in a full chain exploit. For the past few ...
How to Better Fuzz Windows 10 Directx Kernel at Present Xiaoliang Liu DirectX is the engine that handles rendering on the Windows platform. Many outstanding people have ...
Light Commands: Hacking Voice Assistants with Lasers Sara Rampazzi , Benjamin Genkin In the near future, our homes will employ potentially dozens of IoT devices. These devices ...
Permission Mining in GCP Colin Estep Do you know exactly what each user can do in your Google Cloud Platform (GCP) ...
Please Make a Dentist Appointment ASAP: Attacking IOBluetoothFamily HCI and Vendor-Specific Commands Yu Wang In order to control the firmware link manager and baseband controller, Bluetooth stacks usually abstract ...
Story of Jailbreaking iOS 13 08tc3wbb Jailbreaking refers to obtaining the kernel privilege of iOS, by means of the development of ...
Locknote: Conclusions and Key Takeaways from Day 2 Daniel Cuthbert , Marina Krotofil , James Kettle , Leigh-anne Galloway Join members of the Black Hat Review Board for an insightful conversation on the most ...