• 08:50
  • welcome & introduction to black hat usa 2011

     
    Wed, 08:50 - 09:00
    Augustus I + II
  • 09:00
  • Keynote

     
    Wed, 09:00 - 09:50
    Augustus I + II
  • 10:00
  • War Texting: Identifying and Interacting with Devices on the Telephone Network

    Don A. Bailey
    Wed, 10:00 - 11:00
    Augustus I + II - Bit Flow
  • Macs in the Age of the APT

    Tom Daniels, Aaron Grattafiori, Alex Stamos
    Wed, 10:00 - 11:00
    Augustus III + IV - Threat Intel
  • Analyzing SPDY: Getting to know the new web protocol

    Thomas Roth
    Wed, 10:00 - 11:00
    Augustus V + VI - Next-Gen Web
  • Hacking .Net Applications: The Black Arts

    Jon McCoy
    Wed, 10:00 - 11:00
    Roman - Breaking Software
  • Reviving smart card analysis

    Karsten Nohl, Chris Tarnovsky
    Wed, 10:00 - 11:00
    Pompeian - Embedded Exploitation
  • Killing the Myth of Cisco IOS Diversity: Towards Reliable, Large-Scale Exploitation of Cisco IOS

    Ang Cui, Jatin Kataria, Salvatore. J. Stolfo
    Wed, 10:00 - 10:30
    Florentine - Turbo Talks
  • Constant Insecurity: Things you didn't know about (PE) Portable Executable file format

    Tomislav Pericin, Mario Vuksan
    Wed, 10:00 - 11:00
    Milano I - IV - Deeper Analysis
  • Easy and quick vulnerability hunting in Windows

    Cesar Cerrudo
    Wed, 10:00 - 12:30
    Milano V - VIII - Applied Knowledge Workshop Alpha
  • Advanced Wi-Fi Security Penetration Testing

    Vivek Ramachandran
    Wed, 10:00 - 12:30
    Neopolitan I - IV - Applied Knowledge Workshop Beta
  • 10:30
  • Heap spray detection with Heap Inspector

    Aaron LeMasters
    Wed, 10:30 - 11:00
    Florentine - Turbo Talks
  • 11:15
  • Owning the Routing Table - New OSPF Attacks

    Gabi Nakibly
    Wed, 11:15 - 12:30
    Augustus I + II - Bit Flow
  • Weapons of Targeted Attack: Modern Document Exploit Techniques

    Ming-chieh Pan, Sung-Ting Tsai
    Wed, 11:15 - 12:30
    Augustus III + IV - Threat Intel
  • Hacking Google Chrome OS

    Matt Johansen, Kyle Osborne
    Wed, 11:15 - 12:30
    Augustus V + VI - Next-Gen Web
  • Attacking Clientside JIT Compilers

    Yan Ivnitskiy, Chris Rohlf
    Wed, 11:15 - 12:30
    Roman - Breaking Software
  • Vulnerabilities of Wireless Water Meter Networks

    John McNabb
    Wed, 11:15 - 12:30
    Pompeian - Embedded Exploitation
  • IEEE Software Taggant System

    Mike Kennedy, Igor Muttik
    Wed, 11:15 - 11:40
    Florentine - Turbo Talks
  • Physical Memory Forensics for Cache

     
    Wed, 11:15 - 12:30
    Milano I - IV - Deeper Analysis
  • 11:40
  • The Troika of E-Discovery: Ethics, ESI, and Expertise in a Web 2.0 World

    Richard Costa
    Wed, 11:40 - 12:05
    Florentine - Turbo Talks
  • 12:05
  • Overcoming IOS Data Protection to Re-enable iPhone Forensics

    Andrey Belenko
    Wed, 12:05 - 12:30
    Florentine - Turbo Talks
  • 13:45
  • Black Ops of TCP/IP 2011

    Dan Kaminsky
    Wed, 13:45 - 15:00
    Augustus I + II - Bit Flow
  • The Rustock Botnet Takedown

    Julia Wolf
    Wed, 13:45 - 15:00
    Augustus III + IV - Threat Intel
  • Server-Side JavaScript Injection: Attacking NoSQL and Node.js

    Bryan Sullivan
    Wed, 13:45 - 15:00
    Augustus V + VI - Next-Gen Web
  • Windows Hooks of Death: Kernel Attacks Through User-Mode Callbacks

    Tarjei Mandt
    Wed, 13:45 - 15:00
    Roman - Breaking Software
  • Exploiting Siemens Simatic S7 PLCs

    Dillon Beresford
    Wed, 13:45 - 15:00
    Pompeian - Embedded Exploitation
  • From Redmond with Love!

    Katie Moussouris
    Wed, 13:45 - 14:20
    Florentine - Turbo Talks
  • Beyond files undeleting: OWADE

    Elie Bursztein, Ivan Fontarensky, Matthieu Martin, Jean-Michel Picod
    Wed, 13:45 - 15:00
    Milano I - IV - Deeper Analysis
  • The Art of Exploiting Lesser Known Injection Flaws

    Aleksander Gorkowienko, Sumit Siddharth
    Wed, 13:45 - 18:00
    Milano V - VIII - Applied Knowledge Workshop Alpha
  • Binary Instrumentation workshop for security experts

    Gal Diskin
    Wed, 13:45 - 18:00
    Neopolitan I - IV - Applied Knowledge Workshop Beta
  • 14:20
  • SSH as the next back door. Are you giving hackers root access?

    Joe Skehan
    Wed, 14:20 - 15:00
    Florentine - Turbo Talks
  • 15:15
  • Femtocells: A poisonous needle in the operator's hay stack

    Ravishankar Borgaonkar, Nico Golde, Kevin Redon
    Wed, 15:15 - 16:30
    Augustus I + II - Bit Flow
  • Tamper Evident Seals - Design and Security

    datagram
    Wed, 15:15 - 16:30
    Augustus III + IV - Threat Intel
  • Reverse Engineering Browser Components - Dissecting and Hacking Silverlight, HTML 5 and Flex

    Shreeraj Shah
    Wed, 15:15 - 16:30
    Augustus V + VI - Next-Gen Web
  • Apple iOS Security Evaluation: Vulnerability Analysis and Data Encryption

    Dino Dai Zovi
    Wed, 15:15 - 16:30
    Roman - Breaking Software
  • Spy-Sense: Spyware Tool for executing Stealthy Exploits against Sensor Networks

    Thanassis Giannetsos
    Wed, 15:15 - 16:30
    Pompeian - Embedded Exploitation
  • The Ultimate Study of Real-Life SSL Issues

    Ivan Ristic
    Wed, 15:15 - 15:40
    Florentine - Turbo Talks
  • Covert Post-Exploitation Forensics With Metasploit

    Robert McGrew
    Wed, 15:15 - 16:30
    Milano I - IV - Deeper Analysis
  • 15:40
  • Function Rerouting from Kernel Land "Hades"

    Jason Raber
    Wed, 15:40 - 16:05
    Florentine - Turbo Talks
  • 16:05
  • OAuth - Securing the Insecure

    Khash Kiani
    Wed, 16:05 - 16:30
    Florentine - Turbo Talks
  • 16:45
  • Bit-squatting: DNS Hijacking without exploitation

    Artem Dinaburg
    Wed, 16:45 - 18:00
    Augustus I + II - Bit Flow
  • Aerial Cyber Apocalypse: If we can do it... they can too.

    Richard Perkins, Mike Tassey
    Wed, 16:45 - 18:00
    Augustus III + IV - Threat Intel
  • Pulp Google Hacking - The Next Generation Search Engine Hacking Arsenal

    Francis Brown, Rob Ragan
    Wed, 16:45 - 18:00
    Augustus V + VI - Next-Gen Web
  • Playing In The Reader X Sandbox

    Paul Sabanal, Mark Yason
    Wed, 16:45 - 18:00
    Roman - Breaking Software
  • ARM exploitation ROPmap

    Long Le, Thanh Nguyen
    Wed, 16:45 - 18:00
    Pompeian - Embedded Exploitation
  • Familiarity Breeds Contempt: The Honeymoon Effect and the Role of Legacy Code in Zero-Day Vulns

    Sandy Clark
    Wed, 16:45 - 17:10
    Florentine - Turbo Talks
  • Post Memory Corruption Memory Analysis

    Jonathan Brossard
    Wed, 16:45 - 18:00
    Milano I - IV - Deeper Analysis
  • 17:10
  • Affiliate Programs: Legitimate Business or Fuelling Cybercrime?

    Bradley Anstis
    Wed, 17:10 - 17:35
    Florentine - Turbo Talks
  • 17:35
  • PPI-Geolocation: The next generation of 802.11 visualization and geo-location

    Johnny Cache
    Wed, 17:35 - 18:00
    Florentine - Turbo Talks
  • 18:00
  • Reception and Hacker Court

     
    Wed, 18:00 - 19:30
    Augustus I + II
  • 18:15
  • Pwnie Awards

     
    Wed, 18:15 - 19:00
    Augustus I + II