Blackhat Abu Dhabi 2012 Dec. 3, 2012 to Dec. 6, 2012, Abu Dhabi, UAE

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
ADVANCED EXPLOITATION OF ARM-BASED MOBILE AND EMBEDDED DEVICES Stephen Ridley We are currently entering into a "post-PC" exploitation environment where threats to mobile devices are ... Security
THE ART OF CYBERWAR Kenneth Geers The establishment of U.S. Cyber Command in 2010 confirmed that cyberspace is a new domain ... Cyberwar ExcludeThinkstScapes
THE ART OF EXPLOITING LOGICAL FLAWS IN WEB APPS Sumit "sid" Siddharth , Richard Dean In last 5 or so years we have seen a rapid demand for web application ... Web Security ExcludeThinkstScapes
ATTACKING ODATA Gursev Singh Kalra OData is a new data access protocol that is being adopted by many major software ... ExcludeThinkstScapes OData Tools
CASH IS KING: WHOS WEARING YOUR CROWN? Tom Eston , Brett Kimmell Show me the money. If hackers were able to manipulate the worlds accounting systems, governments ... ExcludeThinkstScapes Fraud Accounting
CYBERCRIME KILL CHAIN VS. EFFECTIVENESS OF DEFENSE LAYERS Stefan Frei , Francisco Artes "Cybercriminals persistently challenge the security of organizations through the rapid implementation of diverse attack methodologies, ... Testing ExcludeThinkstScapes Certification
DROID EXPLOITATION SAGA Aditya Gupta , Subho Halder "In this talk, we will be discussing about the recent trends in Android Security Exploitation, ... Android ExcludeThinkstScapes Attack
THE ENDLESS GAME, FIGHTING AGAINST KELIHOS BOTNET Kyle Yang "Kelihos is still alive even after the 2nd take down action, building its p2p infrastructure ... Botnets ExcludeThinkstScapes Kelihos
ENTERPRISE MALWARE, THERE IS ALWAYS A WAY. DNS/DNSSEC Alberto garcia Illera DNS is an essential protocol used in almost any enterprise network around the world. Many ... Security
HTML5 TOP 10 THREATS STEALTH ATTACKS AND SILENT EXPLOITS Shreeraj Shah HTML5 is an emerging stack for next generation applications. HTML5 is enhancing browser capabilities and ... ExcludeThinkstScapes Attack HTML5
HUAWEI ROUTER SECURITY Felix ( FX ) Lindner "Huawei routers are no longer devices only seen in China. Entire countries run their Internet ... Network IncludeThinkstScapes Huawei
INTRODUCING THE SMARTPHONE PENTEST FRAMEWORK Georgia Weidman When many people hear Smartphone Pentest Framework they think this tool lets you run attack ... Android ExcludeThinkstScapes Mobile Security Tools
INSPECTION OF WINDOWS PHONE APPLICATIONS Dmitriy ( d1g1 ) Evdokimov , Andrey Chasovskikh The market share of Windows Phone devices continues to grow and so grows the number ... ExcludeThinkstScapes Windows Phone 8
LEGAL ASPECTS OF CYBERSPACE OPERATIONS - HACKING BACK, ACTIVE RESPONSE AND MORE Robert Clark The past year has seen a lot of articles and briefings on active defense and ... Cyberwar ExcludeThinkstScapes
LESSONS FROM THE HISTORY OF CYBER CONFLICT Jason Healey Even in its earliest history, cyberspace had disruptions, caused by malicious actors, which have gone ... Cyberwar ExcludeThinkstScapes
MALICIOUS URI RESOLVING IN PDFS Valentin Hamon "Attacks by PDFs are most often done from inside PDFs themselves, they are so subject ... ExcludeThinkstScapes PDF Adobe
OVER-THE-AIR CROSS-PLATFORM INFECTION FOR BREAKING MTAN-BASED ONLINE BANKING AUTHENTICATION Alexandra Dmitrienko , Ahmad Sadeghi , Christopher Liebchen , Lucas Davi "We present a novel stealthy cross-platform infection attack in WiFi networks. Our attack has high ... Malware ExcludeThinkstScapes Online Banking mTAN
POKING SERVERS WITH FACEBOOK (AND OTHER WEB APPLICATIONS) Riyaz Walikar Many web applications provide functionality to pull data from other websites for various reasons. Using ... ExcludeThinkstScapes Port Scanning
POWER ANALYSIS ATTACKS FOR CHEAPSKATES "colin O'flynn" Power analysis attacks present a devious method of cracking cryptographic systems. But looking at papers ... Cryptography Attack IncludeThinkstScapes Differential Power Analysis
PRACTICAL SECURITY TESTING FOR LTE NETWORKS Martyn Ruks , Nils New high speed mobile data services are being rolled out every month with a large ... Introductory ExcludeThinkstScapes LTE GSM
QUANTIFYING MALICIOUSNESS IN ALEXA TOP-RANKED DOMAINS Paul Royal Many people assume that it is safe to visit popular, long-lived websites. While anecdotal examples ... Malware Statistics ExcludeThinkstScapes Alexa
REVERSE AND SIMULATE YOUR ENEMY BOTNET C&C Frederic Guihery , Georges Bossert "Have you ever been staring for nights at binary or hexadecimal data flows extracted from ... Reverse Engineering IncludeThinkstScapes Network Protocols
SECURITY IMPACTS OF ABUSING IPV6 EXTENSION HEADERS Antonios Atlasis In 6th June of 2012, during the so called IPv6 world launch day, major ISPs, ... IPv6 ExcludeThinkstScapes IDS Evasion
SOCIAL ENGINEERING THREATS AND COUNTERMEASURES IN AN OVERLY CONNECTED WORLD Shane Macdougall In this presentation, two-time winner of the Defcon Social Engineering CTF competition, Shane MacDougall, will ... Social Engineering ExcludeThinkstScapes
STEALING FROM THIEVES: BREAKING IONCUBE VM TO REVERSE EXPLOIT KITS Mohamed Saher Exploit kits are packs containing malicious programs that are mainly used to carry out automated ... Reverse Engineering Web Security ExcludeThinkstScapes PHP ionCube
TARGETED INTRUSION REMEDIATION: LESSONS FROM THE FRONT LINES Jim Aldridge Successfully remediating a targeted intrusion generally requires a different approach from that applied to non-targeted ... Incident Response IncludeThinkstScapes
BREAKING AND FIXING THE SMART GRID Justin Searle The Smart Grid brings greater benefits for utilities and customer alike, however these benefits come ... ExcludeThinkstScapes Attack Critical Infrastructure
UI REDRESSING ATTACKS ON ANDROID DEVICES Marcus Niemietz In this presentation, we describe novel high-impact user interface attacks on Android-based mobile devices, additionally ... Android ExcludeThinkstScapes Attack Defence Tapjacking