Black Hat USA 2019 part 04

Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

Black Hat USA 2019 part 04


Now in its 22nd year, Black Hat USA is the world’s leading information security event, providing attendees with the very latest in research, development, and trends. BlackHat USA 2019 opens with four days of technical Training (August 3-6) followed by the two-day main conference (August 7-8) featuring Briefings, Arsenal, Business Hall, and more.

 

Join now 

Course Content

Black Hat USA 2019 part 04

  • Playing Offense and Defense with Deepfakes
    00:00
  • Legal GNSS Spoofing and its Effects on Autonomous Vehicles
    00:00
  • Bounty Operations: Best Practices and Common Pitfalls to Avoid in the First 6-12 Months
    00:00
  • Attacking Electric Motors for Fun and Profit
    00:00
  • On Trust: Stories from the Front Lines
    00:00
  • Cybersecurity Risk Assessment for Safety-Critical Systems
    00:00
  • Hunting for Bugs, Catching Dragons
    00:00
  • The Future of ATO
    00:00
  • Transparency in the Software Supply Chain: Making SBOM a Reality
    00:00
  • Battle of Windows Service: A Silver Bullet to Discover File Privilege Escalation Bugs Automatically
    00:00
  • Operational Templates for State-Level Attack and Collective Defense of Countries
    00:00
  • Hacking Your Non-Compete
    00:00
  • Detecting Deep Fakes with Mice
    00:00
  • Zombie Ant Farming: Practical Tips for Playing Hide and Seek with Linux EDRs
    00:00
  • The Future of Securing Intelligent Electronic Devices Using the IEC 62351-7 Standard for Monitoring
    00:00
  • Integration of Cyber Insurance Into A Risk Management Program
    00:00
  • ClickOnce and You’re in – When Appref-ms Abuse is Operating as Intended
    00:00
  • Bypassing the Maginot Line: Remotely Exploit the Hardware Decoder on Smartphone
    00:00
  • PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary
    00:00
  • A Decade After Bleichenbacher ’06, RSA Signature Forgery Still Works
    00:00
  • SSO Wars: The Token Menace
    00:00
  • Worm Charming: Harvesting Malware Lures for Fun and Profit
    00:00
  • Mobile Interconnect Threats: How Next-Gen Products May be Already Outdated
    00:00
  • Securing Apps in the Open-By-Default Cloud
    00:00
  • Rough and Ready: Frameworks to Measure Persistent Engagement and Deterrence
    00:00
  • Finding a Needle in an Encrypted Haystack
    00:00
  • Come Join the CAFSA – Continuous Automated Firmware Security Analysis
    00:00
  • Sensor and Process Fingerprinting in Industrial Control Systems
    00:00
  • I’m Unique, Just Like You: Human Side-Channels and Their Implications for Security and Privacy
    00:00

Student Ratings & Reviews

No Review Yet
No Review Yet