
About Course
Black Hat USA 2020 part 1
Now in its 23rd year, Black Hat USA is the world’s leading information security event, providing attendees with the very latest security research, development, and trends. BlackHat USA 2020 will be entirely virtual this year, held over the same dates, August 1-6 in Pacific Daylight Time (UTC−07:00).
Course Content
Black Hat USA 2020
-
Lateral Movement & Privilege Escalation in GCP; Compromise Organizations without Dropping an Implant
00:00 -
All You Ever Wanted to Know about the AMD Platform Security Processor and were Afraid to Emulate…
00:00 -
IMP4GT: IMPersonation Attacks in 4G NeTworks
00:00 -
Building a Vulnerability Disclosure Program that Works for Election Vendors and Hackers
00:00 -
A Hacker’s Guide to Reducing Side-Channel Attack Surfaces Using Deep-Learning
00:00 -
Demystifying Modern Windows Rootkits
00:00 -
Demystifying Modern Windows Rootkits
00:00 -
Hunting Invisible Salamanders: Cryptographic (in)Security with Attacker-Controlled Keys
00:00 -
Office Drama on macOS
00:00 -
Remote Timing Attacks on TPMs, AKA TPM-Fail
00:00 -
Decade of the RATs – Custom Chinese Linux Rootkits for Everyone
00:00 -
About Directed Fuzzing and Use-After-Free: How to Find Complex & Silent Bugs?
00:00 -
CloudLeak: DNN Model Extractions from Commercial MLaaS Platforms
00:00 -
Routopsy: Modern Routing Protocol Vulnerability Analysis and Exploitation
00:00 -
Uncommon Sense: Detecting Exploits with Novel Hardware Performance Counters and ML Magic
00:00 -
Security Research on Mercedes-Benz: From Hardware to Car Control
00:00 -
Virtually Private Networks
00:00 -
Plundervolt: Flipping Bits from Software without Rowhammer
00:00 -
Operation Chimera – APT Operation Targets Semiconductor Vendors
00:00 -
A Framework for Evaluating and Patching the Human Factor in Cybersecurity
00:00 -
NoJITsu: Locking Down JavaScript Engines
00:00 -
Hiding Process Memory via Anti-Forensic Techniques
00:00 -
EtherOops: Exploring Practical Methods to Exploit Ethernet Packet-in-Packet Attacks
00:00 -
Building Cyber Security Strategies for Emerging Industries in Sub Saharan Africa
00:00 -
Industrial Protocol Gateways Under Analysis
00:00 -
When Lightning Strikes Thrice: Breaking Thunderbolt 3 Security
00:00 -
Beyond Root: Custom Firmware for Embedded Mobile Chipsets
00:00 -
Superman Powered by Kryptonite: Turn the Adversarial Attack into Your Defense Weapon
00:00 -
Lamphone: Real-Time Passive Reconstruction of Speech Using Light Emitted from Lamps
00:00 -
Emulating Samsung’s Baseband for Security Testing
00:00
Student Ratings & Reviews
No Review Yet