• A
  • Advanced AIX Heap Exploitation Methods

    Tim Shelton
    Thu, 16:45 - 18:00
    Augustus 1+2 - Exploitation
  • Adventures in Limited User Post Exploitation

    Tim Elrod, Nathan Keltner
    Wed, 13:45 - 15:00
    Milano 5+6+7+8 - OS Wars
  • Aleatory Persistent Threat

    Nicolas Waisman
    Wed, 11:15 - 12:30
    Milano 1+2+3+4 - Programmatic
  • App Attack: Surviving the Mobile Application Explosion

    John Hering, Kevin Mahaffey
    Wed, 16:45 - 18:00
    Augustus 3+4 - Mobile
  • Attacking Kerberos Deployments

    Rachel Engel, Brad Hill, Scott Stender
    Wed, 10:00 - 11:00
    Milano 5+6+7+8 - OS Wars
  • Attacking Phone Privacy

    Karsten Nohl
    Thu, 15:15 - 16:30
    Milano 5+6+7+8 - Privacy
  • B
  • Bad Memories

    Elie Bursztein, Baptiste Gourdin, Gustav Rydstedt
    Thu, 16:45 - 18:00
    Augustus 5+6 - Client Side
  • Balancing the Pwn Trade Deficit

    Colin Ames, Anthony Lai, Val Smith
    Wed, 11:15 - 12:30
    Florentine - Cyber War & Peace
  • Base Jumping: Attacking GSM Base Station Systems and Mobile Phone Base Bands

    The Grugq
    Wed, 10:00 - 11:00
    Augustus 3+4 - Mobile
  • Becoming the six-million-dollar man

    Gunter Ollmann
    Thu, 11:15 - 12:30
    Forum 24 - Big Picture
  • Black Ops Of Fundamental Defense: Web Edition

    Dan Kaminsky
    Wed, 15:15 - 16:30
    Roman - Infrastructure
  • BlindElephant: WebApp Fingerprinting and Vulnerability Inferencing

    Patrick Thomas
    Wed, 15:15 - 16:30
    Augustus 5+6 - Malware Fingerprinting
  • Blitzableiter - the Release

    FX
    Thu, 13:45 - 15:00
    Augustus 5+6 - Client Side
  • Blue Screen Of the Death is Dead.

    Matthieu Suiche
    Wed, 15:15 - 16:30
    Augustus 1+2 - Reverse Engineering
  • Breaking Browsers: Hacking Auto-Complete

    Jeremiah Grossman
    Thu, 10:00 - 11:00
    Florentine - Turbo
  • Burning Asgard - What happens when Loki breaks free

    Daniel Mende, Enno Rey
    Wed, 13:45 - 15:00
    Forum 24 - Network
  • C
  • Carmen Sandiego is On the Run!

    Don A. Bailey, Nick DePetrillo
    Thu, 16:45 - 18:00
    Milano 5+6+7+8 - Privacy
  • CLOUDINOMICON: Idempotent Infrastructure, Survivable Systems & Bringing Sexy Back to Info Centricity

    Christofer Hoff
    Thu, 10:00 - 11:00
    Augustus 3+4 - Cloud Virtualization
  • Cloud Security Alliance Summit

    Panel
    Wed, 10:00 - 15:00
    Forum 25 - Special Events
  • Constricting the Web: Offensive Python for Web Hackers

    Marcin Wielgoszewski
    Thu, 10:00 - 11:00
    Milano 1+2+3+4 - Web Apps
  • Crash Analysis using BitBlaze

    Noah Johnson, Charlie Miller
    Wed, 11:15 - 12:30
    Augustus 1+2 - Reverse Engineering
  • Cryptographic Agility: Defending Against the Sneakers Scenario

    Bryan Sullivan
    Thu, 16:45 - 18:00
    Roman - Where the Data Lives
  • CSI: TCP/IP

     
    Thu, 10:00 - 11:00
    Pompeiian - Meet the Feds
  • Cyber war...Are we at war? And if we are, how should we fight it?

    General Michael V. Hayden
    Wed, 13:45 - 15:00
    Pompeiian - Executive
  • D
  • Deconstructing ColdFusion

    Brandon Creighton, Chris Eng
    Thu, 16:45 - 18:00
    Milano 1+2+3+4 - Web Apps
  • Defenseless in Depth

    Ryan Smith
    Thu, 13:45 - 15:00
    Forum 24 - Big Picture
  • dirtbox: a Highly Scalable x86/Windows Emulator

    Georg Wicherski
    Thu, 16:45 - 18:00
    Augustus 3+4 - Cloud Virtualization
  • Drivesploit: Circumventing both automated AND manual drive-by-download detection

    Wayne Huang, Caleb Sima
    Wed, 10:00 - 11:00
    Florentine - Cyber War & Peace
  • E
  • Electricity for Free? The Dirty Underbelly of SCADA and Smart Meters

    Joe Cummins, Jonathan Pollet
    Wed, 11:15 - 12:30
    Roman - Infrastructure
  • Elevation of Privilege: The Easy way to Threat Model

    Adam Shostack
    Thu, 11:15 - 12:30
    Florentine - Turbo
  • Everybody be cool this is a roppery!

    Vincenzo Iozzo, Tim Kornau, Ralf-Philipp Weinmann
    Wed, 15:15 - 16:30
    Augustus 3+4 - Mobile
  • Ex-Fed Confessions

     
    Thu, 15:15 - 16:30
    Pompeiian - Meet the Feds
  • Exploiting the Forest with Trees

    Meredith L. Patterson, Len Sassaman
    Wed, 16:45 - 18:00
    Neopolitan 1+2+3+4 - Bug Collecting
  • Exploiting Timing Attacks in Widespread Systems

    Nate Lawson, Taylor Nelson
    Wed, 15:15 - 16:30
    Forum 24 - Network
  • ExploitSpotting: Locating Vulnerabilities Out Of Vendor Patches Automatically

    Jeongwook Oh
    Wed, 10:00 - 11:00
    Augustus 1+2 - Reverse Engineering
  • Extreme-range RFID tracking

    Kristin Paget
    Wed, 11:15 - 12:30
    Forum 24 - Network
  • F
  • Finger Pointing for Fun, Profit and War?

    Tom Parker
    Wed, 15:15 - 16:30
    Florentine - Cyber War & Peace
  • G
  • Getting In Bed With Robin Sage

    Thomas Ryan
    Wed, 16:45 - 18:00
    Florentine - Cyber War & Peace
  • Goodware drugs for malware: on-the-fly malware analysis and containment

    Damiano Bolzoni, Christiaan Schade
    Thu, 16:45 - 18:00
    Neopolitan 1+2+3+4 - Reverse Engineering Redux
  • GWT Security: Don’t Get Distracted by Bright Shiny Objects

    David Byrne, Charles Henderson
    Thu, 13:45 - 15:00
    Milano 1+2+3+4 - Web Apps
  • H
  • Hacker Court

    Kevin Bankston, Carole Fennelly, Jonathan Klein, Kevin Manson, Paul Ohm, Kurt Opsahl, Panel, Richard Salgado, Richard Thieme
    Wed, 15:15 - 18:00
    Forum 25 - Special Events
  • Hacking and protecting Oracle Database Vault

    Esteban Martínez Fayó
    Thu, 15:15 - 16:30
    Roman - Where the Data Lives
  • Hacking Browser's DOM - Exploiting Ajax and RIA

    Shreeraj Shah
    Thu, 15:15 - 16:30
    Augustus 5+6 - Client Side
  • Hacking Java Clients

    Stephen de Vries
    Wed, 13:45 - 15:00
    Milano 1+2+3+4 - Programmatic
  • Hacking Oracle From Web Apps

    Sumit Siddharth
    Thu, 11:15 - 12:30
    Roman - Where the Data Lives
  • Hadoop Security Design? Just Add Kerberos? Really?

    Andrew Becherer
    Thu, 15:15 - 16:30
    Florentine - Turbo
  • Harder, Better, Faster, Stronger: Semi-Auto Vulnerability Research

    Lurene Grenier, Richard Johnson
    Wed, 15:15 - 16:30
    Milano 1+2+3+4 - Programmatic
  • How I Met Your Girlfriend

    Samy Kamkar
    Thu, 15:15 - 16:30
    Milano 1+2+3+4 - Web Apps
  • How to Hack Millions of Routers

    Craig Heffner
    Thu, 10:00 - 11:00
    Augustus 5+6 - Client Side
  • HTTPS Can Byte Me

    Robert Hansen, Josh Sokol
    Thu, 11:15 - 12:30
    Augustus 5+6 - Client Side
  • Human Intel

     
    Thu, 13:45 - 15:00
    Pompeiian - Meet the Feds
  • I
  • Industrial Bug Mining - Extracting, Grading and Enriching the Ore of Exploits

    Ben Nagy
    Wed, 10:00 - 11:00
    Neopolitan 1+2+3+4 - Bug Collecting
  • ISC SIE Passive DNS vs. Apache Cassandra

    Paul Vixie
    Thu, 13:45 - 15:00
    Florentine - Turbo
  • ISSA

    Panel
    Thu, 15:15 - 16:30
    Forum 25 - Special Events
  • J
  • Jackpotting Automated Teller Machines Redux

    Barnaby Jack
    Wed, 13:45 - 15:00
    Augustus 1+2 - Reverse Engineering
  • JavaSnoop: How to Hack Anything Written in Java

    Arshan Dabirsiaghi
    Wed, 15:15 - 16:30
    Neopolitan 1+2+3+4 - Bug Collecting
  • K
  • Keeping the Good Stuff In: Confidential Information Firewalling with the CRM114 Spam Filter & Text Classifier

    William Yerazunis
    Thu, 10:00 - 11:00
    Roman - Where the Data Lives
  • Keynote

     
    Wed, 09:00 - 09:50
    Augustus 1+2
  • L
  • Lifting the Fog

    Marco Slaviero
    Thu, 16:45 - 18:00
    Florentine - Turbo
  • Lord of the Bing: Taking back search engine hacking from Google and Bing

    Francis Brown, Rob Ragan
    Thu, 16:45 - 18:00
    Forum 24 - Big Picture
  • M
  • Malware Attribution: Tracking Cyber Spies and Digital Criminals

    Greg Hoglund
    Wed, 11:15 - 12:30
    Augustus 5+6 - Malware Fingerprinting
  • Malware Freak Show 2010: The Client-Side Boogaloo

    Jibran Ilyas, Nicholas J. Percoco
    Wed, 10:00 - 11:00
    Augustus 5+6 - Malware Fingerprinting
  • Mastering the Nmap Scripting Engine

    David Fifield, Fyodor Vaskovitch
    Wed, 16:45 - 18:00
    Augustus 5+6 - Malware Fingerprinting
  • Meet the Feds Reception

     
    Thu, 16:45 - 18:00
    Pompeiian - Meet the Feds
  • Memory Corruption Attacks: The (almost) Complete History...

    Haroon Meer
    Thu, 10:00 - 11:00
    Augustus 1+2 - Exploitation
  • Microsoft Powershell - It's time to own

    Joshua Kelley, David Kennedy
    Thu, 10:00 - 11:00
    Florentine - Turbo
  • mod_antimalware: A Novel Apache Module for Containing web-based Malware Infections

    Neil Daswani
    Wed, 13:45 - 15:00
    Augustus 5+6 - Malware Fingerprinting
  • More Bugs In More Places: Secure Development On Moble Platforms

    David Kane-Parry
    Wed, 11:15 - 12:30
    Augustus 3+4 - Mobile
  • N
  • Need a hug? I'm secure.

    Charles Henderson, Steve Ocepek
    Thu, 15:15 - 16:30
    Forum 24 - Big Picture
  • NEPTUNE: Dissecting Web-based Malware via Browser and OS Instrumentation

    Rami Kawach
    Thu, 15:15 - 16:30
    Neopolitan 1+2+3+4 - Reverse Engineering Redux
  • Network Stream Debugging with Mallory

    Jeremy Allen, Raj Umadas
    Wed, 13:45 - 15:00
    Neopolitan 1+2+3+4 - Bug Collecting
  • New Threats to Privacy: From TIA to Google

    Moxie Marlinspike
    Thu, 10:00 - 11:00
    Milano 5+6+7+8 - Privacy
  • O
  • One on One Interview with General (Ret.) Michael V. Hayden

    General Michael V. Hayden, Robert Rodriguez
    Wed, 13:45 - 15:00
    Pompeiian - Executive
  • Optimizing the Security Researcher and CSO Relationship

    Bill Boni, Andrew Cushman, David Litchfield, Alex Stamos, John Stewart
    Wed, 10:00 - 11:00
    Pompeiian - Executive
  • P
  • Payload Already Inside: Data Re-Use for ROP exploits

    Long Le
    Wed, 10:00 - 11:00
    Milano 1+2+3+4 - Programmatic
  • Policy, Privacy, Deterrence and Cyber War

     
    Thu, 11:15 - 12:30
    Pompeiian - Meet the Feds
  • PSUDP: A Passive Approach to Network-Wide Covert Communication

    Kenton Born
    Wed, 16:45 - 18:00
    Forum 24 - Network
  • pyREtic – Reversing obfuscated Python bytecode & live Python objects

    Rich Smith
    Thu, 10:00 - 11:00
    Neopolitan 1+2+3+4 - Reverse Engineering Redux
  • R
  • Reception: Security Innovation Network

     
    Wed, 16:45 - 18:00
    Pompeiian - Executive
  • Regional Collegiate Cyberdefense Competition

    Breakout Session
    Thu, 10:00 - 11:00
    Forum 25 - Special Events
  • Return-Oriented Exploitation

    Dino Dai Zovi
    Thu, 13:45 - 15:00
    Augustus 1+2 - Exploitation
  • Reverse Engineering with Hardware Debuggers

    Jason Cheatham, Jason Raber
    Thu, 13:45 - 15:00
    Florentine - Turbo
  • S
  • SAP Backdoors: A Ghost at the Heart of Your Business

    Mariano Nuñez Di Croce
    Wed, 16:45 - 18:00
    Milano 1+2+3+4 - Programmatic
  • SCADA and ICS for Security Experts: How to avoid Cyberdouchery

    James Arlen
    Wed, 13:45 - 15:00
    Roman - Infrastructure
  • Secure Use of Cloud Storage

    Grant Bugher
    Thu, 11:15 - 12:30
    Augustus 3+4 - Cloud Virtualization
  • Security Innovation Network: Connecting Buyers, Builders, and the Research Community

    Steve Elefant, Melissa Hathaway, General Michael V. Hayden, Dr. Doug Maughan, Professor John Mitchell, Robert Rodriguez
    Wed, 15:15 - 16:30
    Pompeiian - Executive
  • Security is Not a Four Letter Word

    Michael Davis
    Thu, 16:45 - 18:00
    Florentine - Turbo
  • Social Networking Special Ops: Extending Data Visualization Tools for faster Pwnage

    Chris Sumner
    Wed, 13:45 - 15:00
    Florentine - Cyber War & Peace
  • SpewPAL: How capturing and replaying attack traffic can save your IDS

    Kyle Cronin, Patrick Engebretson, Dr. Josh Pauli
    Thu, 15:15 - 16:30
    Florentine - Turbo
  • Standing on the Shoulders of the Blue Monster: Hardening Windows Applications

    olle b
    Wed, 15:15 - 16:30
    Milano 5+6+7+8 - OS Wars
  • State of SSL on the Internet: 2010 Survey, Results and Conclusions Routers

    Ivan Ristic
    Thu, 10:00 - 11:00
    Forum 24 - Big Picture
  • Systemic DNS Vulnerabilities and Risk Management: A Discussion With the Experts

    Rod Beckstrom, Dan Kaminsky, Paul Mockapetris, Ken Silva, Mark Weatherford
    Wed, 11:15 - 12:30
    Pompeiian - Executive
  • T
  • The Black Art of Binary Hijacking

    Nick Harbour
    Thu, 15:15 - 16:30
    Florentine - Turbo
  • The DMCA & ACTA vs. Academic & Professional Research: How Misuse of this Intellectual Property Legislation Chills Research, Disclosure and Innovation

    Tiffany Rad
    Thu, 13:45 - 15:00
    Milano 5+6+7+8 - Privacy
  • The Emperor Has No Clothes: Insecurities in Security Infrastructure

    Ben Feinstein, Jeff Jarmoc, Dan King
    Wed, 10:00 - 11:00
    Roman - Infrastructure
  • There's a party at Ring0 (and you're invited)

    Tavis Ormandy, Julien Tinnes
    Thu, 11:15 - 12:30
    Augustus 1+2 - Exploitation
  • These Aren't the Permissions You're Looking For

    Anthony Lineberry, David Richardson, Sr., Timothy Wyatt
    Wed, 13:45 - 15:00
    Augustus 3+4 - Mobile
  • Things You Wanted To Know But Were Afraid To Ask About Managing Your Information Security Career

    Lee Kushner, Mike Murray
    Thu, 13:45 - 15:00
    Forum 25 - Special Events
  • TitanMist: Your First Step to Reversing Nirvana

    Tomas Pericin, Mario Vuksan
    Thu, 13:45 - 15:00
    Neopolitan 1+2+3+4 - Reverse Engineering Redux
  • Token Kidnapping's Revenge

    Cesar Cerrudo
    Thu, 13:45 - 15:00
    Roman - Where the Data Lives
  • U
  • Unauthorized Internet Wiretapping: Exploiting Lawful Intercept

    Tom Cross
    Thu, 11:15 - 12:30
    Milano 5+6+7+8 - Privacy
  • Understanding the Low- Fragmentation Heap: From Allocation to Exploitation

    Christopher Valasek
    Thu, 15:15 - 16:30
    Augustus 1+2 - Exploitation
  • Understanding the Windows SMB NTLM Weak Nonce Vulnerability

    Agustin Azubel, Hernan Ochoa
    Wed, 11:15 - 12:30
    Milano 5+6+7+8 - OS Wars
  • USB - HID, The Hacking Interface Design

    Richard Rushing
    Thu, 16:45 - 18:00
    Florentine - Turbo
  • Ushering in the Post-GRC World: Applied Threat Modeling

    Alex Hutton, Allison Miller
    Wed, 16:45 - 18:00
    Milano 5+6+7+8 - OS Wars
  • Utilizing Code Reuse/Return Oriented Programming in PHP Web Application Exploits

    Stefan Esser
    Thu, 11:15 - 12:30
    Milano 1+2+3+4 - Web Apps
  • V
  • Virt-ICE: Next Generation Debugger for Malware Analysis

    Quynh Nguyen Anh
    Thu, 15:15 - 16:30
    Augustus 3+4 - Cloud Virtualization
  • Virtual Forensics

    Christiaan Beek
    Wed, 11:15 - 12:30
    Neopolitan 1+2+3+4 - Bug Collecting
  • Virtually Pwned: Pentesting Virtualization

    Claudio Criscione
    Thu, 13:45 - 15:00
    Augustus 3+4 - Cloud Virtualization
  • Voyage of the Reverser: A Visual Study of Binary Species

    Sergey Bratus, Greg Conti
    Thu, 11:15 - 12:30
    Neopolitan 1+2+3+4 - Reverse Engineering Redux
  • W
  • Wardriving the Smart Grid: Practical Approaches to Attacking Utility Packet Radios

    Nathan Keltner, Shawn Moyer
    Wed, 16:45 - 18:00
    Roman - Infrastructure
  • Welcome & Introduction to Black Hat USA 2010

    Jeff Moss
    Wed, 08:50 - 09:00
    Augustus 1+2
  • WPA Migration Mode: WEP is back to haunt you…

    Leandro Meiners, Diego Sor
    Wed, 10:00 - 11:00
    Forum 24 - Network
  • Y
  • Your Career = Your Business

    Lee Kushner, Mike Murray
    Thu, 11:15 - 12:30
    Forum 25 - Special Events
  • You Will be Billed $90,000 for This Call

    Mikko Hypponen
    Thu, 11:15 - 12:30
    Florentine - Turbo