• A
  • A Crushing Blow At The Heart of SAP J2EE Engine

    Alexander Polyakov
    Thu, 15:15 - 16:30
    Augustus III + IV - Enterprise Concerns
  • Aerial Cyber Apocalypse: If we can do it... they can too.

    Richard Perkins, Mike Tassey
    Wed, 16:45 - 18:00
    Augustus III + IV - Threat Intel
  • Affiliate Programs: Legitimate Business or Fuelling Cybercrime?

    Bradley Anstis
    Wed, 17:10 - 17:35
    Florentine - Turbo Talks
  • Analyzing SPDY: Getting to know the new web protocol

    Thomas Roth
    Wed, 10:00 - 11:00
    Augustus V + VI - Next-Gen Web
  • Apple iOS Security Evaluation: Vulnerability Analysis and Data Encryption

    Dino Dai Zovi
    Wed, 15:15 - 16:30
    Roman - Breaking Software
  • ARM exploitation ROPmap

    Long Le, Thanh Nguyen
    Wed, 16:45 - 18:00
    Pompeian - Embedded Exploitation
  • Attacking Clientside JIT Compilers

    Yan Ivnitskiy, Chris Rohlf
    Wed, 11:15 - 12:30
    Roman - Breaking Software
  • Automated Detection of HPP Vulnerabilities in Web Applications

    Marco Balduzzi
    Thu, 16:45 - 18:00
    Roman - Web Hacking
  • B
  • Battery Firmware Hacking

    Charlie Miller
    Thu, 11:15 - 12:30
    Pompeian - Expanding Complexity
  • Beyond files undeleting: OWADE

    Elie Bursztein, Ivan Fontarensky, Matthieu Martin, Jean-Michel Picod
    Wed, 13:45 - 15:00
    Milano I - IV - Deeper Analysis
  • Bit-squatting: DNS Hijacking without exploitation

    Artem Dinaburg
    Wed, 16:45 - 18:00
    Augustus I + II - Bit Flow
  • Black Ops of TCP/IP 2011

    Dan Kaminsky
    Wed, 13:45 - 15:00
    Augustus I + II - Bit Flow
  • C
  • Chip & PIN is definitely broken

    Andrea Barisani, Daniele Bianco, Zac Franken, Adam Laurie
    Thu, 16:45 - 18:00
    Pompeian - Expanding Complexity
  • Constant Insecurity: Things you didn't know about (PE) Portable Executable file format

    Tomislav Pericin, Mario Vuksan
    Wed, 10:00 - 11:00
    Milano I - IV - Deeper Analysis
  • Corporate Espionage for Dummies: The Hidden Threat of Embedded Web Servers

    Michael Sutton
    Thu, 11:15 - 12:30
    Augustus III + IV - Enterprise Concerns
  • Covert Post-Exploitation Forensics With Metasploit

    Robert McGrew
    Wed, 15:15 - 16:30
    Milano I - IV - Deeper Analysis
  • Crypto for Pentesters

    Thomas Ptacek
    Thu, 13:45 - 15:00
    Roman - Web Hacking
  • D
  • Don't Drop the SOAP: Real World Web Service Testing for Web Hackers

    Joshua D. Abraham, Tom Eston, Kevin Johnson
    Thu, 10:00 - 11:00
    Roman - Web Hacking
  • Don't Hate the Player, Hate the Game: Inside the Android Security Patch Lifecycle

    Anthony Lineberry, Tim Strazzere, Timothy Wyatt
    Thu, 15:15 - 16:30
    Milano I - IV - The Mobile Track
  • E
  • Exploiting Siemens Simatic S7 PLCs

    Dillon Beresford
    Wed, 13:45 - 15:00
    Pompeian - Embedded Exploitation
  • Exploiting the iOS Kernel

    Stefan Esser
    Thu, 11:15 - 12:30
    Milano I - IV - The Mobile Track
  • Exploiting USB Devices with Arduino

    Greg Ose
    Thu, 13:45 - 15:00
    Pompeian - Expanding Complexity
  • F
  • Faces Of Facebook - Or, How The Largest Real ID Database In The World Came To Be

    Alessandro Acquisti
    Thu, 15:15 - 16:30
    Augustus I + II - The World at Large
  • Familiarity Breeds Contempt: The Honeymoon Effect and the Role of Legacy Code in Zero-Day Vulns

    Sandy Clark
    Wed, 16:45 - 17:10
    Florentine - Turbo Talks
  • Femtocells: A poisonous needle in the operator's hay stack

    Ravishankar Borgaonkar, Nico Golde, Kevin Redon
    Wed, 15:15 - 16:30
    Augustus I + II - Bit Flow
  • From Redmond with Love!

    Katie Moussouris
    Wed, 13:45 - 14:20
    Florentine - Turbo Talks
  • Function Rerouting from Kernel Land "Hades"

    Jason Raber
    Wed, 15:40 - 16:05
    Florentine - Turbo Talks
  • H
  • Hacking and Forensicating an Oracle Database Server

    David Litchfield
    Thu, 16:45 - 18:00
    Augustus III + IV - Enterprise Concerns
  • Hacking Androids for Profit

    Riley Hassell, Shane Macaulay
    Thu, 10:00 - 11:00
    Milano I - IV - The Mobile Track
  • Hacking Google Chrome OS

    Matt Johansen, Kyle Osborne
    Wed, 11:15 - 12:30
    Augustus V + VI - Next-Gen Web
  • Hacking Medical Devices for Fun and Insulin: Breaking the Human SCADA System

    Jerome Radcliffe
    Thu, 15:15 - 16:30
    Pompeian - Expanding Complexity
  • Hacking .Net Applications: The Black Arts

    Jon McCoy
    Wed, 10:00 - 11:00
    Roman - Breaking Software
  • Heap spray detection with Heap Inspector

    Aaron LeMasters
    Wed, 10:30 - 11:00
    Florentine - Turbo Talks
  • I
  • IEEE Software Taggant System

    Mike Kennedy, Igor Muttik
    Wed, 11:15 - 11:40
    Florentine - Turbo Talks
  • Inside Apple's MDM Black Box

    David Schuetz
    Thu, 13:45 - 15:00
    Augustus III + IV - Enterprise Concerns
  • K
  • Keynote

     
    Thu, 08:50 - 09:50
    Augustus I + II
  • Keynote

     
    Wed, 09:00 - 09:50
    Augustus I + II
  • Killing the Myth of Cisco IOS Diversity: Towards Reliable, Large-Scale Exploitation of Cisco IOS

    Ang Cui, Jatin Kataria, Salvatore. J. Stolfo
    Wed, 10:00 - 10:30
    Florentine - Turbo Talks
  • L
  • Legal Aspects of Cybersecurity - (AKA) CYBERLAW: A Year in Review, Cases, issues, your questions my

    Robert Clark
    Thu, 10:00 - 11:00
    Augustus I + II - The World at Large
  • Lives On The Line: Defending Crisis Maps in Libya, Sudan, and Pakistan

    George Chamales
    Thu, 16:45 - 18:00
    Augustus I + II - The World at Large
  • M
  • Macs in the Age of the APT

    Tom Daniels, Aaron Grattafiori, Alex Stamos
    Wed, 10:00 - 11:00
    Augustus III + IV - Threat Intel
  • Microsoft Vista: NDA-less The Good, The Bad, and The Ugly

    Kristin Paget
    Thu, 10:00 - 11:00
    Florentine - Building 127.0.0.1
  • Mobile Malware Madness, and How To Cap the Mad Hatters

    Neil Daswani
    Thu, 16:45 - 18:00
    Milano I - IV - The Mobile Track
  • O
  • OAuth - Securing the Insecure

    Khash Kiani
    Wed, 16:05 - 16:30
    Florentine - Turbo Talks
  • Overcoming IOS Data Protection to Re-enable iPhone Forensics

    Andrey Belenko
    Wed, 12:05 - 12:30
    Florentine - Turbo Talks
  • Owning the Routing Table - New OSPF Attacks

    Gabi Nakibly
    Wed, 11:15 - 12:30
    Augustus I + II - Bit Flow
  • Owning Your Phone at Every Layer - A Mobile Security Panel

    Don A. Bailey, Dino Dai Zovi, Nick DePetrillo, Anthony Lineberry, Charlie Miller, Tyler Shields, Ralf-Philipp Weinmann, Chris Wysopal
    Thu, 13:45 - 15:00
    Milano I - IV - The Mobile Track
  • P
  • Physical Memory Forensics for Cache

     
    Wed, 11:15 - 12:30
    Milano I - IV - Deeper Analysis
  • Playing In The Reader X Sandbox

    Paul Sabanal, Mark Yason
    Wed, 16:45 - 18:00
    Roman - Breaking Software
  • Post Memory Corruption Memory Analysis

    Jonathan Brossard
    Wed, 16:45 - 18:00
    Milano I - IV - Deeper Analysis
  • PPI-Geolocation: The next generation of 802.11 visualization and geo-location

    Johnny Cache
    Wed, 17:35 - 18:00
    Florentine - Turbo Talks
  • Pulp Google Hacking - The Next Generation Search Engine Hacking Arsenal

    Francis Brown, Rob Ragan
    Wed, 16:45 - 18:00
    Augustus V + VI - Next-Gen Web
  • R
  • Reverse Engineering Browser Components - Dissecting and Hacking Silverlight, HTML 5 and Flex

    Shreeraj Shah
    Wed, 15:15 - 16:30
    Augustus V + VI - Next-Gen Web
  • Reviving smart card analysis

    Karsten Nohl, Chris Tarnovsky
    Wed, 10:00 - 11:00
    Pompeian - Embedded Exploitation
  • S
  • Security When Nano-seconds Count

    James Arlen
    Thu, 13:45 - 15:00
    Augustus V + VI - Scoping the Issue
  • Server-Side JavaScript Injection: Attacking NoSQL and Node.js

    Bryan Sullivan
    Wed, 13:45 - 15:00
    Augustus V + VI - Next-Gen Web
  • Smartfuzzing The Web: Carpe Vestra Foramina

    Justin Engler, Gregory Fleischer, Nathan Hamiel, Seth Law
    Thu, 15:15 - 16:30
    Roman - Web Hacking
  • Sophail: A Critical Analysis of Sophos Antivirus

    Tavis Ormandy
    Thu, 11:15 - 12:30
    Augustus V + VI - Scoping the Issue
  • Sour Pickles

    Marco Slaviero
    Thu, 11:15 - 12:30
    Roman - Web Hacking
  • Spy-Sense: Spyware Tool for executing Stealthy Exploits against Sensor Networks

    Thanassis Giannetsos
    Wed, 15:15 - 16:30
    Pompeian - Embedded Exploitation
  • SSH as the next back door. Are you giving hackers root access?

    Joe Skehan
    Wed, 14:20 - 15:00
    Florentine - Turbo Talks
  • SSL And The Future Of Authenticity

    Moxie Marlinspike
    Thu, 13:45 - 15:00
    Augustus I + II - The World at Large
  • Staring into the Abyss: The Dark Side of Secuirity and Professional Intelligence

    Richard Thieme
    Thu, 11:15 - 12:30
    Florentine - Building 127.0.0.1
  • Sticking to the Facts: Scientific Study of Static Analysis Tools

    Kris Britton, Chuck Willis
    Thu, 16:45 - 18:00
    Augustus V + VI - Scoping the Issue
  • T
  • Tamper Evident Seals - Design and Security

    datagram
    Wed, 15:15 - 16:30
    Augustus III + IV - Threat Intel
  • The Law of Mobile Privacy and Security

    Jennifer Granick
    Thu, 11:15 - 12:30
    Augustus I + II - The World at Large
  • The Rustock Botnet Takedown

    Julia Wolf
    Wed, 13:45 - 15:00
    Augustus III + IV - Threat Intel
  • The Troika of E-Discovery: Ethics, ESI, and Expertise in a Web 2.0 World

    Richard Costa
    Wed, 11:40 - 12:05
    Florentine - Turbo Talks
  • The Ultimate Study of Real-Life SSL Issues

    Ivan Ristic
    Wed, 15:15 - 15:40
    Florentine - Turbo Talks
  • Trillions of Lines of Code and Counting - Securing Applications At Scale

    Brad Arkin, Jeremiah Grossman, Alex Hutton, John Johnson, Adrian Lane
    Thu, 10:00 - 11:00
    Augustus V + VI - Scoping the Issue
  • U
  • USB - Undermining Security Barriers

    Andy Davis
    Thu, 10:00 - 11:00
    Pompeian - Expanding Complexity
  • V
  • Virtualization under attack: Breaking out of KVM

    Nelson Elhage
    Thu, 10:00 - 11:00
    Augustus III + IV - Enterprise Concerns
  • Vulnerabilities of Wireless Water Meter Networks

    John McNabb
    Wed, 11:15 - 12:30
    Pompeian - Embedded Exploitation
  • Vulnerability Extrapolation or 'Give me more Bugs like that, please!'

    Fabian Yamaguchi
    Thu, 15:15 - 16:30
    Augustus V + VI - Scoping the Issue
  • W
  • War Texting: Identifying and Interacting with Devices on the Telephone Network

    Don A. Bailey
    Wed, 10:00 - 11:00
    Augustus I + II - Bit Flow
  • Weapons of Targeted Attack: Modern Document Exploit Techniques

    Ming-chieh Pan, Sung-Ting Tsai
    Wed, 11:15 - 12:30
    Augustus III + IV - Threat Intel
  • welcome & introduction to black hat usa 2011

     
    Wed, 08:50 - 09:00
    Augustus I + II
  • Windows Hooks of Death: Kernel Attacks Through User-Mode Callbacks

    Tarjei Mandt
    Wed, 13:45 - 15:00
    Roman - Breaking Software