2 abr 2012

[DESCARGA] Material Blackhat Europe 2012


 

Blackhat Europe 2012 

El congreso de seguridad más importante de Europa. 

  • Axelle Apvrille – Guillaume LovetAn Attacker’s Day into Virology: Human vs Computer
  •  Antonios Atlasis – Attacking IPv6 Implementation Using Fragmentation
  • Michael Baker Finding Needles in Haystacks (The Size of Countries)
  • Andrey Belenko – Dmitry Sklyarov "Secure Password Managers" and “Military-Grade Encryption” on Smartphones: Oh Really?
  • Andy DavisHDMI – Hacking Displays Made Interesting
  • Stephen de Vries – Beyond Scanning: Automating Web Application Security Tests
  • Tyrone Erasmus – The Heavy Metal That Poisoned the Droid
  • Takahiro Haruyama – Hiroshi SuzukiOne-byte Modification for Breaking Memory Forensic Analysis
  • Marcia Hofmann – Seth SchoenDefending Privacy at the U.S. Border: A Guide for Travelers Carrying Digital Devices
  • Jeff Jarmoc – SSL/TLS Interception Proxies and Transitive Trust
  • Ling Chuan Lee – Chan Lee YeeGDI Font Fuzzing in Windows Kernel For Fun
  • Steve Lord – Drop It Like It’s Hotspot: Hacking Mifi Routers For Nefarious Purposes
  • Rafal Los – Shane MacDougallOffensive Threat Modeling for Attackers: Turning Threat Modeling on its Head
  • Matias Madou – Secure in 2010? Broken in 2011!
  • Mariano Nunez Di Croce – Cyber-Attacks & SAP systems: Is Our Business-Critical Infrastructure Exposed?
  • Phil Polstra – Preventing “Oh Shit!” Moments for 20 Euros or Less
  • Jerome Radcliffe – Issues with Embedded Device Disclosures: Helping the Vendors and Recognizing the End-Users
  • Enno Rey – Daniel MendeAll Your Calls Are Still Belong to Us: How We Compromised the Cisco VoIP Crypto Ecosystem
  • Simon Roses Femerling – Smartphone’s Apps Are Not That Smart: Insecure Development Practices
  • Paul Royal – Entrapment: Tricking Malware with Transparent, Scalable Malware Analysis
  • Rahul Sasi – IVR Security- Internal Network Attack via Phone Lines
  • Justin Searle – Dissecting Smart Meters
  • Shreeraj Shah – HTML5 Top 10 Threats: Stealth Attacks and Silent Exploits
  • Sumit Siddharth – Tom ForbesHacking XPATH 2.0
  • Alexey Sintsov – Lotus Domino: Penetration Through the Controller
  • Didier Stevens – Malicious PDF Analysis
  • Ben Williams – They Ought to Know Better: Exploiting Security Gateways via Their Web Interfaces
  • Chris Wysopal – Data Mining a Mountain of Zero Day Vulnerabilities
  • Justin Searle – Workshop: SamuraiWTF