Black Hat USA 2019 - Wednesday, August 7
09:00
Zovi
Every Security Team is a Software Team Now
10:30
Murray
Legal GNSS Spoofing and its Effects on Autonomous Vehicles
Chen, Ma, Ma
Biometric Authentication Under Threat: Liveness Detection Hacking
Gong, Pi
Bypassing the Maginot Line: Remotely Exploit the Hardware Decoder on Smartphone
Chau
A Decade After Bleichenbacher '06, RSA Signature Forgery Still Works
Comerford, Saunders, Williams
Detecting Deep Fakes with Mice
Burke
ClickOnce and You're in - When Appref-ms Abuse is Operating as Intended
Mirosh, Munoz
SSO Wars: The Token Menace
Wu
Battle of Windows Service: A Silver Bullet to Discover File Privilege Escalation Bugs Automatically
Fisher, Valenta
Monsters in the Middleboxes: Building Tools for Detecting HTTPS Interception
11:15
Blaxill, Sandin
PicoDMA: DMA Attacks at Your Fingertips
Feng, Liu
The Most Secure Browser? Pwning Chrome from 2016 to 2019
Jablonski, Wijesekera
Attacking Electric Motors for Fun and Profit
Block, Matula
APIC's Adventures in Wonderland
Vanhoef
Dragonblood: Attacking the Dragonfly Handshake of WPA3
Bialek
Exploiting the Hyper-V IDE Emulator to Escape the Virtual Machine
Metcalf, Morowczynski
Attacking and Defending the Microsoft Cloud (Office 365 & Azure AD)
Bilodeau, Paquet-Clouston
Behind the Scenes: The Industry of Social Media Manipulation Driven by Malware
Francois, Galperin, Schneier
Hacking for the Greater Good: Empowering Technologists to Strengthen Digital Society
13:30
Chuadhry, Ochoa
Sensor and Process Fingerprinting in Industrial Control Systems
Hasarfaty, Moyal
Behind the Scenes of Intel Security and Manageability Engine
Kettle
HTTP Desync Attacks: Smashing into the Cell Next Door
Sedova, Sengirbay
It's Not What You Know, It's What You Do: How Data Can Shape Security Engagement
Wixey
I'm Unique, Just Like You: Human Side-Channels and Their Implications for Security and Privacy
Coldwater, Cooley
The Path Less Traveled: Abusing Kubernetes Defaults
Smith
Cyber Insurance 101 for CISO’s
Borgaonkar, Shaik
New Vulnerabilities in 5G Networks
Shwartz
Selling 0-Days to Governments and Offensive Security Companies
Gao, Huang, Xie, Ye
All the 4G Modules Could be Hacked
14:40
Amini
Worm Charming: Harvesting Malware Lures for Fun and Profit
Chang, Tsai
Infiltrating Corporate Intranet Like NSA - Pre-auth RCE on Leading SSL VPNs
Datko, Roth
Chip.Fail - Glitching the Silicon of the Connected World
Aumasson
Lessons From Two Years of Crypto Audits
Silvanovich
Look, No Hands! -- The Remote, Interaction-less Attack Surface of the iPhone
Mulliner
Come Join the CAFSA - Continuous Automated Firmware Security Analysis
Kouns
Integration of Cyber Insurance Into A Risk Management Program
Kovar, Nickels
MITRE ATT&CK: The Play at Home Edition
Hypponen
Responding to a Cyber Attack with Missiles
Simakov, Zinar
Finding a Needle in an Encrypted Haystack: Leveraging Cryptographic Abilities to Detect the Most Prevalent Attacks on Active Directory
16:00
Beurdouche, Cohn-Gordon, Robert
Messaging Layer Security: Towards a New Era of Secure Group Messaging
Klimburg
The Cyber Shell Game – War, Information Warfare, and the Darkening Web
Dykstra, Stone
Hacking Your Non-Compete
Landers
Flying a False Flag: Advanced C2, Trust Conflicts, and Domain Takeover
Santamarta
Arm IDA and Cross Check: Reversing the Boeing 787's Core Network
Riancho
Internet-Scale Analysis of AWS Cognito Security
Prevost
How Do Cyber Insurers View The World?
Forsgren, Shortridge
Controlled Chaos: The Inevitable Marriage of DevOps & Security
Baril, Itkin
He Said, She Said – Poisoned RDP Offense and Defense
Joly
Hunting for Bugs, Catching Dragons
17:05
Friedman
Transparency in the Software Supply Chain: Making SBOM a Reality
Vanunu, Zaikin
Reverse Engineering WhatsApp Encryption for Chat Manipulation and More
Bernal
Detecting Malicious Files with YARA Rules as They Traverse the Network
Song
PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary
Metzman
Going Beyond Coverage-Guided Fuzzing with Structured Fuzzing
O'Flynn
MINimum Failure - Stealing Bitcoins with Electromagnetic Fault Injection
Heffner, Johnson, Vessels
Cybersecurity Risk Assessment for Safety-Critical Systems
Bursztein, Oliveira
Deconstructing the Phishing Campaigns that Target Gmail Users
Fedorov, Tyagi
Defense Against Rapidly Morphing DDOS
Black Hat USA 2019 - Thursday, August 8
09:00
Wilkin
Testing Your Organization's Social Media Awareness
Pavur
GDPArrrrr: Using Privacy Laws to Steal Identities
Lynch
Woke Hiring Won't Save Us: An Actionable Approach to Diversity Hiring and Retention
Carcano, Dragoni, Pinto
The Future of Securing Intelligent Electronic Devices Using the IEC 62351-7 Standard for Monitoring
Farshchi
On Trust: Stories from the Front Lines
Teissier
Mobile Interconnect Threats: How Next-Gen Products May be Already Outdated
Westelius
Attack Surface as a Service
Soman
Death to the IOC: What's Next in Threat Intelligence
Brand
WebAuthn 101 - Demystifying WebAuthn
09:45
Healey, Jenkins
Rough and Ready: Frameworks to Measure Persistent Engagement and Deterrence
Doerr
The Enemy Within: Modern Supply Chain Attacks
Cui, Housley, Kataria
100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans
Hauke, Renardy
Denial of Service with a Fistful of Packets: Exploiting Algorithmic Complexity Vulnerabilities
Gazet, Matrosov
Breaking Through Another Side: Bypassing Firmware Security Boundaries from Embedded Controller
Price, Price
Playing Offense and Defense with Deepfakes
Ruddermann
Planning a Bug Bounty: The Nuts and Bolts from Concept to Launch
Bai, Zheng
All Your Apple are Belong to Us: Unique Identification and Cross-Device Tracking of Apple Devices
Schneier
Information Security in the Public Interest
Hawkes
Project Zero: Five Years of "Make 0Day Hard"
11:00
Biham, Bitan, Malin, Wool
Rogue7: Rogue Engineering-Station Attacks on S7 Simatic PLCs
Maddux
API-Induced SSRF: How Apple Pay Scattered Vulnerabilities Across the Web
Conti, Fanelli
Operational Templates for State-Level Attack and Collective Defense of Countries
Lacharite
Breaking Encrypted Databases: Generic Attacks on Range Queries
Kang, Nakajima, Yen
Women in Security: Building a Female InfoSec Community in Korea, Japan, and Taiwan
Caswell, Goldstein, Jay, Sabens, Stanley
Bounty Operations: Best Practices and Common Pitfalls to Avoid in the First 6-12 Months
Shrivastava
DevSecOps : What, Why and How
Robbins, Schroeder, Vazarkar
Finding Our Path: How We're Trying to Improve Active Directory Security
Klein, Kotler
Process Injection Techniques - Gotta Catch Them All
12:10
Snezhkov
Zombie Ant Farming: Practical Tips for Playing Hide and Seek with Linux EDRs
Delikat, Knighton
Ghidra - Journey from Classified NSA Tool to Open Source
Almubayed
Practical Approach to Automate the Discovery and Eradication of Open-Source Software Vulnerabilities at Scale
Blazakis, Keltner
Firmware Cartography: Charting the Course for Modern Server Compromise
Gong, Pi
Exploiting Qualcomm WLAN and Modem Over The Air
Zenz
Infighting Among Russian Security Services in the Cyber Sphere
Brown
Managing for Success: Maintaining a Healthy Bug Bounty Program Long Term
Krstić
Behind the scenes of iOS and Mac Security
Cai, Gruffke, Schweppe, Wang, Zhang
0-days & Mitigations: Roadways to Exploit and Secure Connected BMW Cars
Jacobs, Roytman
Predictive Vulnerability Scoring System
14:30
Huang, Wang
Towards Discovering Remote Code Execution Vulnerabilities in Apple FaceTime
Chan, Jaiswal, Zhang
Preventing Authentication Bypass: A Tale of Two Researchers
Benfey, Menn, Rioux, Zatko
Making Big Things Better the Dead Cow Way
Davidov, Erickson
Inside the Apple T2
Stone
Securing the System: A Deep Dive into Reversing Android Pre-Installed Apps
Rolles
Automation Techniques in C++ Reverse Engineering
Berta
Backdooring Hardware Devices by Injecting Malicious Payloads on Microcontrollers
Smith, Wolf
Fantastic Red-Team Attacks and How to Find Them
Seri, Zusman
Critical Zero Days Remotely Compromise the Most Popular Real-Time OS
15:50
Birch
HostSplit: Exploitable Antipatterns in Unicode Normalization
Bédrune, Campana
Everybody be Cool, This is a Robbery!
Franceschi-Bicchierai
The Discovery of a Government Malware and an Unexpected Spy Scandal
Martin
The Future of ATO
Howes, Wozniak
Securing Apps in the Open-By-Default Cloud
Januszkiewicz
Adventures in the Underland: The CQForensic Toolkit as a Unique Weapon Against Hackers
Wang, Xu
Attacking iPhone XS Max
Edwards, Freeman
A Compendium of Container Escapes
Breuer, Perlman
Hacking Ten Million Useful Idiots: Online Propaganda as a Socio-Technical Security Project
17:00
Li, Wu
Debug for Bug: Crack and Hack Apple Core by Itself - Fun and Profit to Debug and Fuzz Apple Kernel by lldb Script
Jerkeby
Command Injection in F5 iRules
., Huebler
Moving from Hacking IoT Gadgets to Breaking into One of Europe's Highest Hotel Suites
Heisler, Stanislav
Shifting Knowledge Left: Keeping up with Modern Application Security
Li, Qian, Wu
Exploring the New World : Remote Exploitation of SQLite and Curl
Andonov, Sardar
Paging All Windows Geeks – Finding Evil in Windows 10 Compressed Memory
Hölzel, Lovink
How to Detect that Your Domains are Being Abused for Phishing by Using DNS
Stump, Wyler
Lessons and Lulz: The 5th Annual Black Hat USA NOC Report
Adamski, Guilbon, Peterlin
Breaking Samsung's ARM TrustZone


Instructions

This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.

Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.