• Wednesday, July 28
  • Welcome & Introduction to Black Hat USA 2010

    Jeff Moss
    Wed, 08:50 - 09:00
    Augustus 1+2
  • Keynote

     
    Wed, 09:00 - 09:50
    Augustus 1+2
  • ExploitSpotting: Locating Vulnerabilities Out Of Vendor Patches Automatically

    Jeongwook Oh
    Wed, 10:00 - 11:00
    Augustus 1+2 - Reverse Engineering
  • Crash Analysis using BitBlaze

    Noah Johnson, Charlie Miller
    Wed, 11:15 - 12:30
    Augustus 1+2 - Reverse Engineering
  • Jackpotting Automated Teller Machines Redux

    Barnaby Jack
    Wed, 13:45 - 15:00
    Augustus 1+2 - Reverse Engineering
  • Blue Screen Of the Death is Dead.

    Matthieu Suiche
    Wed, 15:15 - 16:30
    Augustus 1+2 - Reverse Engineering
  • Thursday, July 29
  • Memory Corruption Attacks: The (almost) Complete History...

    Haroon Meer
    Thu, 10:00 - 11:00
    Augustus 1+2 - Exploitation
  • There's a party at Ring0 (and you're invited)

    Tavis Ormandy, Julien Tinnes
    Thu, 11:15 - 12:30
    Augustus 1+2 - Exploitation
  • Return-Oriented Exploitation

    Dino Dai Zovi
    Thu, 13:45 - 15:00
    Augustus 1+2 - Exploitation
  • Understanding the Low- Fragmentation Heap: From Allocation to Exploitation

    Christopher Valasek
    Thu, 15:15 - 16:30
    Augustus 1+2 - Exploitation
  • Advanced AIX Heap Exploitation Methods

    Tim Shelton
    Thu, 16:45 - 18:00
    Augustus 1+2 - Exploitation