About Course
Black Hat USA 2018 part 02
Now in its 21st year, Black Hat USA is the world’s leading information security event, providing attendees with the very latest in research, development, and trends. BlackHat USA 2018 opens with four days of technical pieces of training (August 4 – 7) followed by the two-day main conference (August 8 – 9) featuring Briefings, Arsenal, Business Hall, and more.
Course Content
Black Hat USA 2018 part 02
-
IoT Malware: Comprehensive Survey, Analysis Framework and Case Studies
00:00 -
SDL the Wont Break the Bank
00:00 -
For the Love of Money: Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems
00:00 -
Last Call for SATCOM Security
00:00 -
Exploitation of a Modern Smartphone Baseband
00:00 -
Automated Discovery of Deserialization Gadget Chains
00:00 -
Legal Liability for IOT Cybersecurity Vulnerabilities
00:00 -
Another Flip in the Row
00:00 -
How can Someone with Autism Specifically Enhance the Cyber Security Workforce?
00:00 -
Catch me, Yes we can! – Pwning Social Engineers
00:00 -
Automating Exploit Generation for Arbitrary Types of Kernel Vulnerabilities
00:00 -
Windows Offender: Reverse Engineering Windows Defender’s Antivirus Emulator
00:00 -
Protecting the Protector, Hardening Machine Learning Defenses Against Adversarial Attacks
00:00 -
Playback: A TLS 1.3 Story
00:00 -
An Inside Story of Mitigating Speculative Execution Side Channel Vulnerabilities
00:00 -
TLBleed: When Protecting Your CPU Caches is Not Enough
00:00 -
None of My Pixel is Your Business: Active Watermarking Cancellation Against Video Streaming Service
00:00 -
So I became a Domain Controller
00:00 -
WebAssembly: A New World of Native Exploits on the Browser
00:00 -
Outsmarting the Smart City
00:00 -
Are You Trading Stocks Securely? Exposing Security Flaws in Trading Technologies
00:00 -
AI & ML in Cyber Security – Why Algorithms are Dangerous
00:00 -
Stealth Mango and the Prevalence of Mobile Surveillanceware
00:00 -
Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels
00:00 -
A Deep Dive into macOS MDM (and How it can be Compromised)
00:00 -
Pestilential Protocol: How Unsecure HL7 Messages Threaten Patient Lives
00:00 -
GOD MODE UNLOCKED – Hardware Backdoors in x86 CPUs
00:00 -
Decompiler Internals: Microcode
00:00 -
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform Capabilities
00:00 -
Windows Notification Facility: Peeling the Onion of the Most Undocumented Kernel Attack Surface Yet
00:00 -
Kernel Mode Threats and Practical Defenses
00:00 -
New Norms and Policies in Cyber-Diplomacy
00:00 -
Snooping on Cellular Gateways and Their Critical Role in ICS
00:00
Student Ratings & Reviews
No Review Yet