• Wednesday, August 3
  • welcome & introduction to black hat usa 2011

     
    Wed, 08:50 - 09:00
    Augustus I + II
  • Keynote

     
    Wed, 09:00 - 09:50
    Augustus I + II
  • War Texting: Identifying and Interacting with Devices on the Telephone Network

    Don A. Bailey
    Wed, 10:00 - 11:00
    Augustus I + II - Bit Flow
  • Owning the Routing Table - New OSPF Attacks

    Gabi Nakibly
    Wed, 11:15 - 12:30
    Augustus I + II - Bit Flow
  • Black Ops of TCP/IP 2011

    Dan Kaminsky
    Wed, 13:45 - 15:00
    Augustus I + II - Bit Flow
  • Femtocells: A poisonous needle in the operator's hay stack

    Ravishankar Borgaonkar, Nico Golde, Kevin Redon
    Wed, 15:15 - 16:30
    Augustus I + II - Bit Flow
  • Bit-squatting: DNS Hijacking without exploitation

    Artem Dinaburg
    Wed, 16:45 - 18:00
    Augustus I + II - Bit Flow
  • Reception and Hacker Court

     
    Wed, 18:00 - 19:30
    Augustus I + II
  • Pwnie Awards

     
    Wed, 18:15 - 19:00
    Augustus I + II
  • Thursday, August 4
  • Keynote

     
    Thu, 08:50 - 09:50
    Augustus I + II
  • Legal Aspects of Cybersecurity - (AKA) CYBERLAW: A Year in Review, Cases, issues, your questions my

    Robert Clark
    Thu, 10:00 - 11:00
    Augustus I + II - The World at Large
  • The Law of Mobile Privacy and Security

    Jennifer Granick
    Thu, 11:15 - 12:30
    Augustus I + II - The World at Large
  • SSL And The Future Of Authenticity

    Moxie Marlinspike
    Thu, 13:45 - 15:00
    Augustus I + II - The World at Large
  • Faces Of Facebook - Or, How The Largest Real ID Database In The World Came To Be

    Alessandro Acquisti
    Thu, 15:15 - 16:30
    Augustus I + II - The World at Large
  • Lives On The Line: Defending Crisis Maps in Libya, Sudan, and Pakistan

    George Chamales
    Thu, 16:45 - 18:00
    Augustus I + II - The World at Large