Black Hat USA 2018 part 02

Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

Black Hat USA 2018 part 02

Now in its 21st year, Black Hat USA is the world’s leading information security event, providing attendees with the very latest in research, development, and trends. BlackHat USA 2018 opens with four days of technical pieces of training (August 4 – 7) followed by the two-day main conference (August 8 – 9) featuring Briefings, Arsenal, Business Hall, and more.

Course Content

Black Hat USA 2018 part 02

  • IoT Malware: Comprehensive Survey, Analysis Framework and Case Studies
    00:00
  • SDL the Wont Break the Bank
    00:00
  • For the Love of Money: Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems
    00:00
  • Last Call for SATCOM Security
    00:00
  • Exploitation of a Modern Smartphone Baseband
    00:00
  • Automated Discovery of Deserialization Gadget Chains
    00:00
  • Legal Liability for IOT Cybersecurity Vulnerabilities
    00:00
  • Another Flip in the Row
    00:00
  • How can Someone with Autism Specifically Enhance the Cyber Security Workforce?
    00:00
  • Catch me, Yes we can! – Pwning Social Engineers
    00:00
  • Automating Exploit Generation for Arbitrary Types of Kernel Vulnerabilities
    00:00
  • Windows Offender: Reverse Engineering Windows Defender’s Antivirus Emulator
    00:00
  • Protecting the Protector, Hardening Machine Learning Defenses Against Adversarial Attacks
    00:00
  • Playback: A TLS 1.3 Story
    00:00
  • An Inside Story of Mitigating Speculative Execution Side Channel Vulnerabilities
    00:00
  • TLBleed: When Protecting Your CPU Caches is Not Enough
    00:00
  • None of My Pixel is Your Business: Active Watermarking Cancellation Against Video Streaming Service
    00:00
  • So I became a Domain Controller
    00:00
  • WebAssembly: A New World of Native Exploits on the Browser
    00:00
  • Outsmarting the Smart City
    00:00
  • Are You Trading Stocks Securely? Exposing Security Flaws in Trading Technologies
    00:00
  • AI & ML in Cyber Security – Why Algorithms are Dangerous
    00:00
  • Stealth Mango and the Prevalence of Mobile Surveillanceware
    00:00
  • Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels
    00:00
  • A Deep Dive into macOS MDM (and How it can be Compromised)
    00:00
  • Pestilential Protocol: How Unsecure HL7 Messages Threaten Patient Lives
    00:00
  • GOD MODE UNLOCKED – Hardware Backdoors in x86 CPUs
    00:00
  • Decompiler Internals: Microcode
    00:00
  • Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform Capabilities
    00:00
  • Windows Notification Facility: Peeling the Onion of the Most Undocumented Kernel Attack Surface Yet
    00:00
  • Kernel Mode Threats and Practical Defenses
    00:00
  • New Norms and Policies in Cyber-Diplomacy
    00:00
  • Snooping on Cellular Gateways and Their Critical Role in ICS
    00:00

Student Ratings & Reviews

No Review Yet
No Review Yet
ResearcherStore

Want to receive push notifications for all major on-site activities?