
About Course
Black Hat Europe 2016 part 1
Black Hat is returning to Europe again in 2016, and we have quite an event in store. Here the brightest professionals and researchers in the industry will come together for a total of four days–two days of deeply technical hands-on Training, followed by two days of the latest research and vulnerability disclosures at our Briefings.
Course Content
Black Hat Europe 2016 part 1
-
Automating Incident Response
00:00 -
ARMageddon: How Your Smartphone CPU Breaks Software-Level Security and Privacy
00:00 -
Breaking BHAD: Abusing Belkin Home Automation Devices
00:00 -
EGO MARKET: When People’s Greed for Fame Benefits Large-Scale Botnets
00:00 -
Witchcraft Compiler Collection: Towards Self Aware Computer Programs
00:00 -
DRAMA: How Your DRAM Becomes a Security Problem
00:00 -
Talking Behind Your Back: Attacks and Countermeasures of Ultrasonic Cross-Device Tracking
00:00 -
Stumping the Mobile Chipset
00:00 -
Attacking Windows by Windows
00:00 -
Cyber Judo: Offensive Cyber Defense
00:00 -
Narcos, Counterfeiters and Scammers: An Approach to Visualize Illegal Markets
00:00 -
Towards a Policy-Agnostic Control-Flow Integrity Implementation
00:00 -
Rooting EVERY Android: From Extension to Exploitation
00:00 -
Another Brick Off the Wall: Deconstructing Web Application Firewalls Using Automata Learning
00:00 -
How to Fool an ADC, Part II or Hiding Destruction of Turbine with a Little Help of Signal Processing
00:00 -
Chasing Foxes by the Numbers: Patterns of Life and Activity in Hacker Forums
00:00 -
Mobile Espionage in the Wild: Pegasus and Nation-State Level Attacks
00:00 -
I Know What You Saw Last Minute – The Chrome Browser Case
00:00 -
Code Deobfuscation: Intertwining Dynamic, Static and Symbolic Approaches
00:00 -
Effective File Format Fuzzing – Thoughts, Techniques and Results
00:00 -
50 Thousand Needles in 5 Million Haystacks: Understanding Old Malware Tricks
00:00
Student Ratings & Reviews
No Review Yet