Blackhat USA 2009 July 25, 2009 to July 30, 2009, Las Vegas, USA

Event Page

Tell us about missing data
Title Speakers Summary Topic Types
I Just Found 10 Million Ssn'S Alessandro Acquisti None Security
Fighting Russian Cybercrime Mobsters: Report From The Trenches Dmitri Alperovitch , Keith Mularski None Security
Sniff Keystrokes With Lasers/Voltmeters Andrea Barisani , Daniele Bianco None Security
Md5 Chosen-Prefix Collisions On Gpus Marc Bevand None Security
Anti-Forensics: The Rootkit Connection Bill Blunden None Security
Embedded Management Interfaces: Emerging Massive Insecurity Elie Bursztein , Dan Boneh , Hristo Bojinov None Security
Bittorrent Hacks Michael Brooks , David Aslanian None Security
Exploratory Android Surgery Jesse Burns None Android Security
Reversing And Exploiting An Apple® Firmware Update K. Chen None Security
Sade: Injecting Agents Into Vm Guest Os Matthew ( Shok ) Conover None Security
Advanced Mac Os X Rootkits Dino Dai Zovi None Security Rootkits
Lockpicking Forensics Datagram & Vidiot None Security Forensics
Recoverable Advanced Metering Infrastructure Mike Davis None Security Infrastructure
Psychotronica: Exposure, Control, And Deceit Nitesh Dhanjani None Security
The Language Of Trust: Exploiting Trust Relationships In Active Content Mark Dowd , Ryan Smith , David Dewey None Security
Advanced Mysql Exploitation Muhaimin Dzulfakar None Security Exploitation
Demystifying Fuzzers Michael Eddington None Security
Using Guided Missiles In Drive-By'S: Automatic Browser Fingerprinting And Exploitation With Metasploit Egypt None Security Exploitation Browser
Gizmo: A Lightweight Open Source Web Proxy Rachel Engel None Security Web
State Of The Art Post Exploitation In Hardened Php Environments Stefan Esser None Security Exploitation
Hacking The Smart Grid Tony Flick None Security
Internet Special Ops: Stalking Badness Through Data Mining Paul Vixie , Andrew Fried , Dr. Chris Lee None Security
Breaking The Unbreakable Oracle With Metasploit Chris Gates None Security
A 16 Bit Rootkit And Second Generation Zigbee Chips Travis Goodspeed None Security
Smart Parking Meter Implementations, Globalism, And You Joe ( Kingpin ) Grand , Christopher Tarnovsky , Jacob Appelbaum None Security
Computer Crime Year In Review: Myspace, Mbta, Boston College And More Jennifer Granick None Security
Mo' Money Mo' Problems: Making A Lot More Money On The Web The Black Hat Way Jeremiah Grossman , Trey Ford None Security Web
How Economics And Information Security Affects Cyber Crime And What It Means In The Context Of A Global Recession Peter Guerra None Security
Weaponizing The Web: More Attacks On User-Generated Content Nathan Hamiel , Shawn Moyer None Security
Win At Reversing: Tracing And Sandboxing Through Inline Hooking Nick Harbour None Security
Exploiting Rich Content Riley Hassell None Security
Veiled: A Browser-Based Darknet Billy Hoffman , Matt Wood None Security
The Conficker Mystery Mikko Hypponen None Security
Post Exploitation Bliss: Loading Meterpreter On A Factory Iphone Charlie Miller , Vincenzo Iozzo None Security Exploitation
Something About Network Security Dan Kaminsky None Security
Stoned Bootkit Peter Kleissner None Security
Cloudburst: Hacking 3D (And Breaking Out Of Vmware) Kostya Kortchinsky None Security
Attacking Sms Luis Miras , Zane Lackey None Security
Rapid Enterprise Triaging (Retri): How To Run A Compromised Network And Keep Your Data Safe Aaron Lemasters , Michael Murphy None Security
Keynote: Cyberspace, A Fragile Ecosystem Robert F. Lentz None Security
Router Exploitation Felix ( FX ) Lindner None Security Exploitation
Is Your Phone Pwned? Auditing, Attacking And Defending Mobile Devices Anthony Lineberry , Kevin Mahaffey , John Hering None Security
More Tricks For Defeating Ssl Moxie Marlinspike None Security SSL
Practical Windows Xp/2003 Heap Exploitation John Mcdonald , Chris Valasek None Security Exploitation
Clobbering The Cloud Marco Slaviero , Nick Arvanitis , Haroon Meer Security
Erez Metula None Security
Fuzzing The Phone In Your Phone Charlie Miller , Collin Mulliner None Security Fuzzing
A Black Hat Vulnerability Risk Assessment David Mortman None Security Risk
Netscreen Of The Dead: Developing A Trojaned Screenos For Juniper Netscreen Appliances Graeme Neilson None Security
Long-Term Sessions: This Is Why We Can'T Have Nice Things Steve Ocepek None Security
Fight Against 1-Day Exploits: Diffing Binaries Vs Anti-Diffing Binaries Jeongwook Oh None Security
Deactivate The Rootkit Alfredo Ortega , Anibal Sacco None Security
Reverse Engineering By Crayon: Game Changing Hypervisor Based Malware Analysis And Visualization Lorie M. Liebrock , Danny Quist None Security Analysis Malware
Your Mind: Legal Status, Rights And Securing Yourself James Arlen , Tiffany Strauchs Rad None Security Legal
Automated Malware Similarity Analysis Daniel Raygoza None Security Analysis Malware
Re-Conceptualizing Security Bruce Schneier None Security
Metasploit Autopsy: Reconstructing The Crime Scene Steve Davis , Peter Silberman None Security
Metaphish Colin Ames , David Kerb , Val Smith None Security
Breaking The Security Myths Of Extended Validation Ssl Certificates Mike Zusman , Alexander Sotirov None Security SSL
Worst Of The Best Of The Best Kevin Stadmeyer , Garrett Held None Security
Cloud Computing Models And Vulnerabilities: Raining On The Trendy New Parade Alex Stamos , Andrew Becherer , Nathan Wilcox None Security Cloud
Defensive Rewriting: A New Take On Xss/Xsrf/Redirect-Phishing Defense Bryan Sullivan None Security
What The Hell Is Inside There? Christopher Tarnovsky None Security
Introducing Ring -3 Rootkits Alexander Tereshkin , Rafal Wojtczuk None Security Rootkits
Global Spying: Realistic Probabilities In Modern Signals Intelligence Steve Topletz , Jonathan Williams None Security
Ruby For Pentesters Michael Tracy , Chris Rohlf , Eric Monti None Security
Metasploit Telephony Dustin ( I)ruid ) Trammell None Security
Our Favorite Xss Filters And How To Attack Them Eduardo Vela Nava , David Lindsay None Security
Fast & Furious Reverse Engineering With Titanengine Mario Vuksan , Tomislav Pericin None Security
Unraveling Unicode: A Bag Of Tricks For Bug Hunting Chris Weber None Security
Enterprise Java Rootkits Jeff Williams None Security Rootkits
Attacking Intel® Bios Rafal Wojtczuk , Alexander Tereshkin None Security