Black Hat USA 2019 - Wednesday, August 7
Every Security Team is a Software Team Now
Legal GNSS Spoofing and its Effects on Autonomous Vehicles
Chen, Ma, Ma
Biometric Authentication Under Threat: Liveness Detection Hacking
Gong, Pi
Bypassing the Maginot Line: Remotely Exploit the Hardware Decoder on Smartphone
A Decade After Bleichenbacher '06, RSA Signature Forgery Still Works
Comerford, Saunders, Williams
Detecting Deep Fakes with Mice
ClickOnce and You're in - When Appref-ms Abuse is Operating as Intended
Mirosh, Munoz
SSO Wars: The Token Menace
Battle of Windows Service: A Silver Bullet to Discover File Privilege Escalation Bugs Automatically
Fisher, Valenta
Monsters in the Middleboxes: Building Tools for Detecting HTTPS Interception
Blaxill, Sandin
PicoDMA: DMA Attacks at Your Fingertips
Feng, Liu
The Most Secure Browser? Pwning Chrome from 2016 to 2019
Jablonski, Wijesekera
Attacking Electric Motors for Fun and Profit
Block, Matula
APIC's Adventures in Wonderland
Dragonblood: Attacking the Dragonfly Handshake of WPA3
Exploiting the Hyper-V IDE Emulator to Escape the Virtual Machine
Metcalf, Morowczynski
Attacking and Defending the Microsoft Cloud (Office 365 & Azure AD)
Bilodeau, Paquet-Clouston
Behind the Scenes: The Industry of Social Media Manipulation Driven by Malware
Francois, Galperin, Schneier
Hacking for the Greater Good: Empowering Technologists to Strengthen Digital Society
Chuadhry, Ochoa
Sensor and Process Fingerprinting in Industrial Control Systems
Hasarfaty, Moyal
Behind the Scenes of Intel Security and Manageability Engine
HTTP Desync Attacks: Smashing into the Cell Next Door
Sedova, Sengirbay
It's Not What You Know, It's What You Do: How Data Can Shape Security Engagement
I'm Unique, Just Like You: Human Side-Channels and Their Implications for Security and Privacy
Coldwater, Cooley
The Path Less Traveled: Abusing Kubernetes Defaults
Cyber Insurance 101 for CISO’s
Borgaonkar, Shaik
New Vulnerabilities in 5G Networks
Selling 0-Days to Governments and Offensive Security Companies
Gao, Huang, Xie, Ye
All the 4G Modules Could be Hacked
Worm Charming: Harvesting Malware Lures for Fun and Profit
Chang, Tsai
Infiltrating Corporate Intranet Like NSA - Pre-auth RCE on Leading SSL VPNs
Datko, Roth
Chip.Fail - Glitching the Silicon of the Connected World
Lessons From Two Years of Crypto Audits
Look, No Hands! -- The Remote, Interaction-less Attack Surface of the iPhone
Come Join the CAFSA - Continuous Automated Firmware Security Analysis
Integration of Cyber Insurance Into A Risk Management Program
Kovar, Nickels
MITRE ATT&CK: The Play at Home Edition
Responding to a Cyber Attack with Missiles
Simakov, Zinar
Finding a Needle in an Encrypted Haystack: Leveraging Cryptographic Abilities to Detect the Most Prevalent Attacks on Active Directory
Beurdouche, Cohn-Gordon, Robert
Messaging Layer Security: Towards a New Era of Secure Group Messaging
The Cyber Shell Game – War, Information Warfare, and the Darkening Web
Dykstra, Stone
Hacking Your Non-Compete
Flying a False Flag: Advanced C2, Trust Conflicts, and Domain Takeover
Arm IDA and Cross Check: Reversing the Boeing 787's Core Network
Internet-Scale Analysis of AWS Cognito Security
How Do Cyber Insurers View The World?
Forsgren, Shortridge
Controlled Chaos: The Inevitable Marriage of DevOps & Security
Baril, Itkin
He Said, She Said – Poisoned RDP Offense and Defense
Hunting for Bugs, Catching Dragons
Transparency in the Software Supply Chain: Making SBOM a Reality
Vanunu, Zaikin
Reverse Engineering WhatsApp Encryption for Chat Manipulation and More
Detecting Malicious Files with YARA Rules as They Traverse the Network
PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary
Going Beyond Coverage-Guided Fuzzing with Structured Fuzzing
MINimum Failure - Stealing Bitcoins with Electromagnetic Fault Injection
Heffner, Johnson, Vessels
Cybersecurity Risk Assessment for Safety-Critical Systems
Bursztein, Oliveira
Deconstructing the Phishing Campaigns that Target Gmail Users
Fedorov, Tyagi
Defense Against Rapidly Morphing DDOS
Black Hat USA 2019 - Thursday, August 8
Testing Your Organization's Social Media Awareness
GDPArrrrr: Using Privacy Laws to Steal Identities
Woke Hiring Won't Save Us: An Actionable Approach to Diversity Hiring and Retention
Carcano, Dragoni, Pinto
The Future of Securing Intelligent Electronic Devices Using the IEC 62351-7 Standard for Monitoring
On Trust: Stories from the Front Lines
Mobile Interconnect Threats: How Next-Gen Products May be Already Outdated
Attack Surface as a Service
Death to the IOC: What's Next in Threat Intelligence
WebAuthn 101 - Demystifying WebAuthn
Healey, Jenkins
Rough and Ready: Frameworks to Measure Persistent Engagement and Deterrence
The Enemy Within: Modern Supply Chain Attacks
Cui, Housley, Kataria
100 Seconds of Solitude: Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans
Hauke, Renardy
Denial of Service with a Fistful of Packets: Exploiting Algorithmic Complexity Vulnerabilities
Gazet, Matrosov
Breaking Through Another Side: Bypassing Firmware Security Boundaries from Embedded Controller
Price, Price
Playing Offense and Defense with Deepfakes
Planning a Bug Bounty: The Nuts and Bolts from Concept to Launch
Bai, Zheng
All Your Apple are Belong to Us: Unique Identification and Cross-Device Tracking of Apple Devices
Information Security in the Public Interest
Project Zero: Five Years of "Make 0Day Hard"
Biham, Bitan, Malin, Wool
Rogue7: Rogue Engineering-Station Attacks on S7 Simatic PLCs
API-Induced SSRF: How Apple Pay Scattered Vulnerabilities Across the Web
Conti, Fanelli
Operational Templates for State-Level Attack and Collective Defense of Countries
Breaking Encrypted Databases: Generic Attacks on Range Queries
Kang, Nakajima, Yen
Women in Security: Building a Female InfoSec Community in Korea, Japan, and Taiwan
Caswell, Goldstein, Jay, Sabens, Stanley
Bounty Operations: Best Practices and Common Pitfalls to Avoid in the First 6-12 Months
DevSecOps : What, Why and How
Robbins, Schroeder, Vazarkar
Finding Our Path: How We're Trying to Improve Active Directory Security
Klein, Kotler
Process Injection Techniques - Gotta Catch Them All
Zombie Ant Farming: Practical Tips for Playing Hide and Seek with Linux EDRs
Delikat, Knighton
Ghidra - Journey from Classified NSA Tool to Open Source
Practical Approach to Automate the Discovery and Eradication of Open-Source Software Vulnerabilities at Scale
Blazakis, Keltner
Firmware Cartography: Charting the Course for Modern Server Compromise
Gong, Pi
Exploiting Qualcomm WLAN and Modem Over The Air
Infighting Among Russian Security Services in the Cyber Sphere
Managing for Success: Maintaining a Healthy Bug Bounty Program Long Term
Behind the scenes of iOS and Mac Security
Cai, Gruffke, Schweppe, Wang, Zhang
0-days & Mitigations: Roadways to Exploit and Secure Connected BMW Cars
Jacobs, Roytman
Predictive Vulnerability Scoring System
Huang, Wang
Towards Discovering Remote Code Execution Vulnerabilities in Apple FaceTime
Chan, Jaiswal, Zhang
Preventing Authentication Bypass: A Tale of Two Researchers
Benfey, Menn, Rioux, Zatko
Making Big Things Better the Dead Cow Way
Davidov, Erickson
Inside the Apple T2
Securing the System: A Deep Dive into Reversing Android Pre-Installed Apps
Automation Techniques in C++ Reverse Engineering
Backdooring Hardware Devices by Injecting Malicious Payloads on Microcontrollers
Smith, Wolf
Fantastic Red-Team Attacks and How to Find Them
Seri, Zusman
Critical Zero Days Remotely Compromise the Most Popular Real-Time OS
HostSplit: Exploitable Antipatterns in Unicode Normalization
Bédrune, Campana
Everybody be Cool, This is a Robbery!
The Discovery of a Government Malware and an Unexpected Spy Scandal
The Future of ATO
Howes, Wozniak
Securing Apps in the Open-By-Default Cloud
Adventures in the Underland: The CQForensic Toolkit as a Unique Weapon Against Hackers
Wang, Xu
Attacking iPhone XS Max
Edwards, Freeman
A Compendium of Container Escapes
Breuer, Perlman
Hacking Ten Million Useful Idiots: Online Propaganda as a Socio-Technical Security Project
Li, Wu
Debug for Bug: Crack and Hack Apple Core by Itself - Fun and Profit to Debug and Fuzz Apple Kernel by lldb Script
Command Injection in F5 iRules
., Huebler
Moving from Hacking IoT Gadgets to Breaking into One of Europe's Highest Hotel Suites
Heisler, Stanislav
Shifting Knowledge Left: Keeping up with Modern Application Security
Li, Qian, Wu
Exploring the New World : Remote Exploitation of SQLite and Curl
Andonov, Sardar
Paging All Windows Geeks – Finding Evil in Windows 10 Compressed Memory
Hölzel, Lovink
How to Detect that Your Domains are Being Abused for Phishing by Using DNS
Stump, Wyler
Lessons and Lulz: The 5th Annual Black Hat USA NOC Report
Adamski, Guilbon, Peterlin
Breaking Samsung's ARM TrustZone


This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.

Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.