Blackhat Europe 2012
El congreso de seguridad más importante de Europa.
- Axelle Apvrille – Guillaume LovetAn Attacker’s Day into Virology: Human vs Computer
- Antonios Atlasis – Attacking IPv6 Implementation Using Fragmentation
- Michael Baker – Finding Needles in Haystacks (The Size of Countries)
- Andrey Belenko – Dmitry Sklyarov "Secure Password Managers" and “Military-Grade Encryption” on Smartphones: Oh Really?
- Andy DavisHDMI – Hacking Displays Made Interesting
- Stephen de Vries – Beyond Scanning: Automating Web Application Security Tests
- Tyrone Erasmus – The Heavy Metal That Poisoned the Droid
- Takahiro Haruyama – Hiroshi SuzukiOne-byte Modification for Breaking Memory Forensic Analysis
- Marcia Hofmann – Seth SchoenDefending Privacy at the U.S. Border: A Guide for Travelers Carrying Digital Devices
- Jeff Jarmoc – SSL/TLS Interception Proxies and Transitive Trust
- Ling Chuan Lee – Chan Lee YeeGDI Font Fuzzing in Windows Kernel For Fun
- Steve Lord – Drop It Like It’s Hotspot: Hacking Mifi Routers For Nefarious Purposes
- Rafal Los – Shane MacDougallOffensive Threat Modeling for Attackers: Turning Threat Modeling on its Head
- Matias Madou – Secure in 2010? Broken in 2011!
- Mariano Nunez Di Croce – Cyber-Attacks & SAP systems: Is Our Business-Critical Infrastructure Exposed?
- Phil Polstra – Preventing “Oh Shit!” Moments for 20 Euros or Less
- Jerome Radcliffe – Issues with Embedded Device Disclosures: Helping the Vendors and Recognizing the End-Users
- Enno Rey – Daniel MendeAll Your Calls Are Still Belong to Us: How We Compromised the Cisco VoIP Crypto Ecosystem
- Simon Roses Femerling – Smartphone’s Apps Are Not That Smart: Insecure Development Practices
- Paul Royal – Entrapment: Tricking Malware with Transparent, Scalable Malware Analysis
- Rahul Sasi – IVR Security- Internal Network Attack via Phone Lines
- Justin Searle – Dissecting Smart Meters
- Shreeraj Shah – HTML5 Top 10 Threats: Stealth Attacks and Silent Exploits
- Sumit Siddharth – Tom ForbesHacking XPATH 2.0
- Alexey Sintsov – Lotus Domino: Penetration Through the Controller
- Didier Stevens – Malicious PDF Analysis
- Ben Williams – They Ought to Know Better: Exploiting Security Gateways via Their Web Interfaces
- Chris Wysopal – Data Mining a Mountain of Zero Day Vulnerabilities
- Justin Searle – Workshop: SamuraiWTF