Black Hat Europe 2016 part 1

Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

Black Hat Europe 2016 part 1

Black Hat is returning to Europe again in 2016, and we have quite an event in store. Here the brightest professionals and researchers in the industry will come together for a total of four days–two days of deeply technical hands-on Training, followed by two days of the latest research and vulnerability disclosures at our Briefings.

About the instructor

Course Curriculum

Black Hat Europe 2016 part 1

  • Automating Incident Response
    00:00
  • ARMageddon: How Your Smartphone CPU Breaks Software-Level Security and Privacy
    00:00
  • Breaking BHAD: Abusing Belkin Home Automation Devices
    00:00
  • EGO MARKET: When People’s Greed for Fame Benefits Large-Scale Botnets
    00:00
  • Witchcraft Compiler Collection: Towards Self Aware Computer Programs
    00:00
  • DRAMA: How Your DRAM Becomes a Security Problem
    00:00
  • Talking Behind Your Back: Attacks and Countermeasures of Ultrasonic Cross-Device Tracking
    00:00
  • Stumping the Mobile Chipset
    00:00
  • Attacking Windows by Windows
    00:00
  • Cyber Judo: Offensive Cyber Defense
    00:00
  • Narcos, Counterfeiters and Scammers: An Approach to Visualize Illegal Markets
    00:00
  • Towards a Policy-Agnostic Control-Flow Integrity Implementation
    00:00
  • Rooting EVERY Android: From Extension to Exploitation
    00:00
  • Another Brick Off the Wall: Deconstructing Web Application Firewalls Using Automata Learning
    00:00
  • How to Fool an ADC, Part II or Hiding Destruction of Turbine with a Little Help of Signal Processing
    00:00
  • Chasing Foxes by the Numbers: Patterns of Life and Activity in Hacker Forums
    00:00
  • Mobile Espionage in the Wild: Pegasus and Nation-State Level Attacks
    00:00
  • I Know What You Saw Last Minute – The Chrome Browser Case
    00:00
  • Code Deobfuscation: Intertwining Dynamic, Static and Symbolic Approaches
    00:00
  • Effective File Format Fuzzing – Thoughts, Techniques and Results
    00:00
  • 50 Thousand Needles in 5 Million Haystacks: Understanding Old Malware Tricks
    00:00

Student Ratings & Reviews

No Review Yet
No Review Yet
ResearcherStore

Want to receive push notifications for all major on-site activities?