About Course
Black Hat USA 2019 part 04
Now in its 22nd year, Black Hat USA is the world’s leading information security event, providing attendees with the very latest in research, development, and trends. BlackHat USA 2019 opens with four days of technical Training (August 3-6) followed by the two-day main conference (August 7-8) featuring Briefings, Arsenal, Business Hall, and more.
Course Content
Black Hat USA 2019 part 04
-
Playing Offense and Defense with Deepfakes
00:00 -
Legal GNSS Spoofing and its Effects on Autonomous Vehicles
00:00 -
Bounty Operations: Best Practices and Common Pitfalls to Avoid in the First 6-12 Months
00:00 -
Attacking Electric Motors for Fun and Profit
00:00 -
On Trust: Stories from the Front Lines
00:00 -
Cybersecurity Risk Assessment for Safety-Critical Systems
00:00 -
Hunting for Bugs, Catching Dragons
00:00 -
The Future of ATO
00:00 -
Transparency in the Software Supply Chain: Making SBOM a Reality
00:00 -
Battle of Windows Service: A Silver Bullet to Discover File Privilege Escalation Bugs Automatically
00:00 -
Operational Templates for State-Level Attack and Collective Defense of Countries
00:00 -
Hacking Your Non-Compete
00:00 -
Detecting Deep Fakes with Mice
00:00 -
Zombie Ant Farming: Practical Tips for Playing Hide and Seek with Linux EDRs
00:00 -
The Future of Securing Intelligent Electronic Devices Using the IEC 62351-7 Standard for Monitoring
00:00 -
Integration of Cyber Insurance Into A Risk Management Program
00:00 -
ClickOnce and You’re in – When Appref-ms Abuse is Operating as Intended
00:00 -
Bypassing the Maginot Line: Remotely Exploit the Hardware Decoder on Smartphone
00:00 -
PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary
00:00 -
A Decade After Bleichenbacher ’06, RSA Signature Forgery Still Works
00:00 -
SSO Wars: The Token Menace
00:00 -
Worm Charming: Harvesting Malware Lures for Fun and Profit
00:00 -
Mobile Interconnect Threats: How Next-Gen Products May be Already Outdated
00:00 -
Securing Apps in the Open-By-Default Cloud
00:00 -
Rough and Ready: Frameworks to Measure Persistent Engagement and Deterrence
00:00 -
Finding a Needle in an Encrypted Haystack
00:00 -
Come Join the CAFSA – Continuous Automated Firmware Security Analysis
00:00 -
Sensor and Process Fingerprinting in Industrial Control Systems
00:00 -
I’m Unique, Just Like You: Human Side-Channels and Their Implications for Security and Privacy
00:00
Student Ratings & Reviews
No Review Yet