Material de la BlackHat Europe 2015

Ya tenemos el material de la conferencia BlackHat 2015 en Europa, que este año volvía a Amsterdan y que tuvo lugar del 10 al 13 de noviembre:

pres= presentation
wp= white paper 

- What Got Us Here Wont Get Us There - pres
- (In-)Security of Backend-As-A-Service - pres - wp
- A Peek Under the Blue Coat - pres
- All Your Root Checks Belong to Us: The Sad State of Root Detection
- AndroBugs Framework: An Android Application Security Vulnerability Scanner - pres
- Attacking the XNU Kernel in El Capitain - pres
- Authenticator Leakage through Backup Channels on Android - pres
- Automating Linux Malware Analysis Using Limon Sandbox - pres - wp
- Breaking Access Controls with BLEKey
- Bypassing Local Windows Authentication to Defeat Full Disk Encryption - pres - wp
- Bypassing Self-Encrypting Drives (SED) in Enterprise Environments- pres - wp
- Commix: Detecting and Exploiting Command Injection Flaws - pres - wp
- Continuous Intrusion: Why CI tools are an Attackers Best Friends - pres
- Cybercrime in the Deep Web - pres - wp
- Cybersecurity for Oil and Gas Industries: How Hackers Can Manipulate Oil Stocks - pres - wp
- Defending Against Malicious Application Compatibility Shims - pres - wp
- Even the LastPass Will be Stolen Deal with It! - pres
- Exploiting Adobe Flash Player in the Era of Control Flow Guard - pres
- Faux Disk Encryption: Realities of Secure Storage on Mobile Devices - pres - wp
- Fuzzing Android: A Recipe for Uncovering Vulnerabilities Inside System Components in Android - pres - wp
- Going AUTH the Rails on a Crazy Train - pres  - wp
- Hey Man Have You Forgotten to Initialize Your Memory? - pres - wp
- Hiding in Plain Sight - Advances in Malware Covert Communication Channels - pres - wp
- How to Break XML Encryption - Automatically - wp
 -Implementing Practical Electrical Glitching Attacks
- Is Your TimeSpace Safe?  - Time and Position Spoofing Opensourcely - pres - wp
- Lessons from Defending the Indefensible - pres
- Locknote: Conclusions and Key Takeaways from Black Hat Europe 2015
- LTE & IMSI Catcher Myths - pres - wp
- New (and Newly-Changed) Fully Qualified Domain Names:  A View of Worldwide Changes to the Internets DNS - pres
- New Tool for Discovering Flash Player 0-day Attacks in the Wild from Various Channels - pres - wp
- Panel: What You Need to Know About the Changing Regulatory Landscape in Information Security
- Self-Driving and Connected Cars: Fooling Sensors and Tracking Drivers - pres - wp1 - wp2
- Silently Breaking ASLR in the Cloud - pres - wp
- Stegosploit - Exploit Delivery with Steganography and Polyglots - pres
- Triaging Crashes with Backward Taint Analysis for ARM Architecture - pres
- Unboxing the White-Box: Practical Attacks Against Obfuscated Ciphers - pres - wp
- VoIP Wars: Destroying Jar Jar Lync - pres
- Vulnerability Exploitation in Docker Container Environments - pres - wp
- Watching the Watchdog: Protecting Kerberos Authentication with Network Monitoring - pres - wp
- Your Scripts in My Page - What Could Possibly Go Wrong?

Comentarios