Black Hat Print Schedule
Easily print and export your event schedule.
Print This

Black HatView Full Schedule: blackhat2010.sched.com


July 28 • Wednesday

  8:00am –  8:45am G Breakfast
Break
  8:45am –  9:00am G Welcome & Introduction Black Hat USA 2010
Opening Ceremonies
  9:00am –  9:45am G Keynote Day - 1
Opening Ceremonies
  9:45am –  10:00am G Break
Break
 10:00am –  10:30am P CSA: Cloudersize: A cardio, strength & conditioning program for a firmer, more toned *aaS
Day 1 - Special Events
 10:00am –  11:00am A ExploitSpotting: Locating Vulnerabilities Out Of Vendor Patches Automatically
Day 1 - Reverse Engineering
 10:00am –  11:00am S Base Jumping: Attacking GSM Base Station Systems and mobile phone Base Bands
Day 1 - Mobile
 10:00am –  11:00am T Malware Freak Show 2010: The Client-Side Boogaloo
Day 1 - Malware +Fingerprinting
 10:00am –  11:00am F The Chinese Cyber Army: An Archaeological Study from 2001 to 2010
Day 1 - Cyber War & Peace
 10:00am –  11:00am O WPA Migration Mode: WEP is back to haunt you...
Day 1 - Network
 10:00am –  11:00am U Optimizing the Security Researcher and CSO Relationship
Day 1 - Executive Briefings
 10:00am –  11:00am M Payload Already Inside: Data Re-Use for ROP Exploits
Day 1 - Programmatic
 10:00am –  11:00am L Attacking Kereberos Deployments
Day 1 - OS Wars
 10:00am –  11:00am N Industrial Bug Mining - Extracting, Grading and Enriching the Ore of Exploits
Day 1 - Bug Collecting
 10:00am –  11:00am R The Emperor Has No Clothes: Insecurities in Security Infrastructure
Day 1 - Infrastructure
 10:30am –  11:00am P CSA: Cloudy with a chance of miss-information
Day 1 - Special Events
 11:00am –  11:15am G Coffee Service
Break
 11:00am –  11:30am P CSA: Application Security FIndings
Day 1 - Special Events
 11:15am –  12:30pm A Crash Analysis using BitBlaze
Day 1 - Reverse Engineering
 11:15am –  12:30pm S More Bugs In More Places: Secure Development On Moble Platforms
Day 1 - Mobile
 11:15am –  12:30pm T Malware Attribution: Tracking Cyber Spies and Digital Criminals
Day 1 - Malware +Fingerprinting
 11:15am –  12:30pm F Balancing the Pwn Trade Deficit
Day 1 - Cyber War & Peace
 11:15am –  12:30pm O Extreme-range RFID tracking
Day 1 - Network
 11:15am –  12:30pm U Systemic DNS Vulnerabilities and Risk Management: A Discussion with the Experts
Day 1 - Executive Briefings
 11:15am –  12:30pm M Aleatory Persistent Threat
Day 1 - Programmatic
 11:15am –  12:30pm L Understanding the Windows SMB NTLM Weak Nonce vulnerability
Day 1 - OS Wars
 11:15am –  12:30pm N Virtual Forensics
Day 1 - Bug Collecting
 11:15am –  12:30pm R Electricity for Free? The Dirty Underbelly of SCADA and Smart Meters
Day 1 - Infrastructure
 11:30am –  12:00pm P CSA: Security and compliance in the Amazon cloud
Day 1 - Special Events
 12:00pm –  12:30pm P CSA: Hacking the Hypervisor 2010
Day 1 - Special Events
 12:30pm –  1:45pm G Lunch
Break
  1:30pm –  2:00pm P CSA: The Cloud is made of Software
Day 1 - Special Events
  1:45pm –  3:00pm A Jackpotting Automated Teller Machines Redux
Day 1 - Reverse Engineering
  1:45pm –  3:00pm S These Aren't the Permissions You're Looking For
Day 1 - Mobile
  1:45pm –  3:00pm T mod_antimalware: a novel apache module for containing web-based malware infections
Day 1 - Malware +Fingerprinting
  1:45pm –  3:00pm F Social Networking Special Ops: Extending data visualization tools for faster Pwnage
Day 1 - Cyber War & Peace
  1:45pm –  3:00pm O Burning Asgard - What happens when Loki breaks free
Day 1 - Network
  1:45pm –  3:00pm U Cyber war... Are we at war? And if we are, how should we fight it?
Day 1 - Executive Briefings
  1:45pm –  3:00pm M Hacking Java Clients
Day 1 - Programmatic
  1:45pm –  3:00pm L Adventures in Limited User Post Exploitation
Day 1 - OS Wars
  1:45pm –  3:00pm N Network Stream Debugging with Mallory
Day 1 - Bug Collecting
  1:45pm –  3:00pm R SCADA and ICS for Security Experts: How to avoid Cyberdouchery
Day 1 - Infrastructure
  2:00pm –  3:00pm P CSA: The "Unpanel Royal" : The Yin and Yang of Cloud Abuse
Day 1 - Special Events
  3:00pm –  3:15pm G Break
Break
  3:15pm –  4:00pm T BlindElephant: WebApp Fingerprinting and Vulnerability Inferencing
Day 1 - Malware +Fingerprinting
  3:15pm –  4:30pm A Blue Screen Of the Death is dead
Day 1 - Reverse Engineering
  3:15pm –  4:30pm S Everybody be cool this is a roppery!
Day 1 - Mobile
  3:15pm –  4:30pm F Finger Pointing for Fun, Profit and War?
Day 1 - Cyber War & Peace
  3:15pm –  4:30pm O Exploiting timing attacks in widespread systems
Day 1 - Network
  3:15pm –  4:30pm U One on One Interview with General (Ret.) Michael V. Hayden
Day 1 - Executive Briefings
  3:15pm –  4:30pm M Harder, Better, Faster, Stronger: Semi-Auto Vulnerability Research
Day 1 - Programmatic
  3:15pm –  4:30pm L Hacking the Trading Floor
Day 1 - OS Wars
  3:15pm –  4:30pm N JavaSnoop: How to hack anything written in Java
Day 1 - Bug Collecting
  3:15pm –  4:30pm P Hacker Court
Day 1 - Special Events
  3:15pm –  4:30pm R Black Ops Of Fundamental Defense: Web Edition
Day 1 - Infrastructure
  4:30pm –  4:45pm G Coffee Service
Break
  4:45pm –  6:00pm A TBA
Day 1 - Reverse Engineering
  4:45pm –  6:00pm S App Attack: Surviving the Mobile Application Explosion
Day 1 - Mobile
  4:45pm –  6:00pm T Mastering the Nmap Scripting Engine
Day 1 - Malware +Fingerprinting
  4:45pm –  6:00pm F Getting In Bed With Robin Sage
Day 1 - Cyber War & Peace
  4:45pm –  6:00pm O PSUDP: A Passive Approach to Network-Wide Covert Communication
Day 1 - Network
  4:45pm –  6:00pm U Security Innovation Network Panel: Connecting Buyers, Builders, and the Research Community
Day 1 - Executive Briefings
  4:45pm –  6:00pm M SAP Backdoors: A ghost at the heart of your business
Day 1 - Programmatic
  4:45pm –  6:00pm L Standing on the shoulders of the blue monster - Hardening Windows applications
Day 1 - OS Wars
  4:45pm –  6:00pm N Exploiting the Forest with Trees
Day 1 - Bug Collecting
  4:45pm –  6:00pm P Hacker Court Continued
Day 1 - Special Events
  4:45pm –  6:00pm R Wardriving the Smart Grid: Practical Approaches to Attacking Utility Packet Radios
Day 1 - Infrastructure
  6:00pm –  7:30pm G Gala Reception + pwnie awards
Reception

Black HatView Full Schedule: blackhat2010.sched.com


July 29 • Thursday

  8:00am –  8:45am G Breakfast
Break
  8:45am –  9:45am G Keynote Speaker Day 2
Opening Ceremonies
  9:45am –  10:00am G Break
Break
 10:00am –  10:30am F Microsoft Powershell - It's time to own
Day 2 - Turbo Talks
 10:00am –  11:00am A Memory Corruption Attacks: The (almost) Complete History...
Day 2 - Exploitation
 10:00am –  11:00am S CLOUDINOMICON: Idempotent Infrastructure, Survivable Systems & Bringing Sexy Back to Information Centricity
Day 2 - Cloud Virtualization
 10:00am –  11:00am T How to Hack Millions of Routers
Day 2 - Client Side
 10:00am –  11:00am O State of SSL on the Internet: 2010 Survey, Results and Conclusions
Day 2 - Big Picture
 10:00am –  11:00am U CSI: TCP/IP
Day 2 - Meet the Feds
 10:00am –  11:00am M Utilizing Code Reuse/Return Oriented Programming in PHP Web Application Exploits
Day 2 - Web Apps
 10:00am –  11:00am L Changing Threats To Privacy: From TIA To Google
Day 2 - Privacy
 10:00am –  11:00am N pyREtic – Reversing obfuscated Python bytecode & live Python objects
Day 2 - Reverse Engineering Redux
 10:00am –  11:00am P Breakout Session: Regional Collegiate Cyberdefense Competition
Day 2 - Special Events
 10:00am –  11:00am R Keeping the Good Stuff In: Confidential Information Firewalling with the CRM114 Spam Filter & Text Classifier
Day 2 - Where the Data Lives
 10:30am –  11:00am F Breaking Browsers: Hacking Auto-Complete
Day 2 - Turbo Talks
 11:00am –  11:15am G Coffee Service
Break
 11:15am –  11:45am F You will be billed $90,000 for this call
Day 2 - Turbo Talks
 11:15am –  12:30pm A There's a party at Ring0 (and you're invited)
Day 2 - Exploitation
 11:15am –  12:30pm S Secure Use of Cloud Storage
Day 2 - Cloud Virtualization
 11:15am –  12:30pm T HTTPS Can Byte Me
Day 2 - Client Side
 11:15am –  12:30pm O Becoming the six-million-dollar man
Day 2 - Big Picture
 11:15am –  12:30pm U Panel: Policy, Privacy, Deterrence and Cyber War
Day 2 - Meet the Feds
 11:15am –  12:30pm M Constricting the Web: Offensive Python for Web Hackers
Day 2 - Web Apps
 11:15am –  12:30pm N Voyage of the Reverser: A Visual Study of Binary Species
Day 2 - Reverse Engineering Redux
 11:15am –  12:30pm P Your Career = Your Business
Day 2 - Special Events
 11:15am –  12:30pm R Hacking Oracle From Web Apps
Day 2 - Where the Data Lives
 11:15am –  12:45pm L Unauthorized Internet Wiretapping: Exploiting Lawful Intercept
Day 2 - Privacy
 11:45am –  12:30pm F Ushering in the Post-GRC World: Applied Threat Modeling
Day 2 - Turbo Talks
 12:30pm –  1:45pm G Lunch
Break
  1:45pm –  2:15pm F Elevation of Privilege: The easy way to threat model
Day 2 - Turbo Talks
  1:45pm –  3:00pm A Return-Oriented Exploitation
Day 2 - Exploitation
  1:45pm –  3:00pm S Virtually Pwned: Pentesting Virtualization
Day 2 - Cloud Virtualization
  1:45pm –  3:00pm T Blitzableiter - the Release
Day 2 - Client Side
  1:45pm –  3:00pm O Defenseless in Depth
Day 2 - Big Picture
  1:45pm –  3:00pm U Human Intel
Day 2 - Meet the Feds
  1:45pm –  3:00pm M GWT Security: Don’t get distracted by bright shiny objects
Day 2 - Web Apps
  1:45pm –  3:00pm L The DMCA & ACTA vs. Academic & Professional Research: How Misuse of this Intellectual Property Legislation Chills Research, Disclosure and Innovation
Day 2 - Privacy
  1:45pm –  3:00pm N TitanMist: Your First Step to Reversing Nirvana
Day 2 - Reverse Engineering Redux
  1:45pm –  3:00pm P Things You Wanted To Know But Were Afraid To Ask About Managing Your Information Security Career
Day 2 - Special Events
  1:45pm –  3:00pm R Token Kidnapping's Revenge
Day 2 - Where the Data Lives
  2:15pm –  2:45pm F ISC SIE Passive DNS vs. Apache Cassandra
Day 2 - Turbo Talks
  2:45pm –  3:00pm F Reverse Engineering with Hardware Debuggers
Day 2 - Turbo Talks
  3:00pm –  3:15pm G Break
Break
  3:15pm –  3:45pm F SprayPAL: How capturing and replaying attack traffic can save your IDS
Day 2 - Turbo Talks
  3:15pm –  4:30pm A Understanding the Low-Fragmentation Heap: From Allocation to Exploitation
Day 2 - Exploitation
  3:15pm –  4:30pm S Virt-ICE: next generation debugger for malware analysis
Day 2 - Cloud Virtualization
  3:15pm –  4:30pm T Hacking Browser's DOM - Exploiting Ajax and RIA
Day 2 - Client Side
  3:15pm –  4:30pm O Need a hug? I'm secure.
Day 2 - Big Picture
  3:15pm –  4:30pm U Panel: Ex-Fed Confessions
Day 2 - Meet the Feds
  3:15pm –  4:30pm M How I Met Your Girlfriend
Day 2 - Web Apps
  3:15pm –  4:30pm L Attacking phone privacy
Day 2 - Privacy
  3:15pm –  4:30pm P Panel: ISSA
Day 2 - Special Events
  3:15pm –  4:30pm R Hacking and protecting Oracle Database Vault
Day 2 - Where the Data Lives
  3:15pm –  5:30pm N NEPTUNE: Dissecting Web-based Malware via Browser and OS Instrumentation
Day 2 - Reverse Engineering Redux
  3:45pm –  4:15pm F Hadoop Security Design? Just Add Kerberos? Really?
Day 2 - Turbo Talks
  4:15pm –  4:30pm F The Black Art of Binary Hijacking
Day 2 - Turbo Talks
  4:30pm –  4:45pm G Ice Cream Sundae Social
Break
  4:45pm –  5:15pm F USB - HID, The Hacking Interface Design
Day 2 - Turbo Talks
  4:45pm –  6:00pm A Advanced AIX Heap Exploitation Methods
Day 2 - Exploitation
  4:45pm –  6:00pm T Bad memories
Day 2 - Client Side
  4:45pm –  6:00pm O Lord of the Bing: Taking back search engine hacking from Google and Bing
Day 2 - Big Picture
  4:45pm –  6:00pm U Meet the Fed's Reception
Day 2 - Meet the Feds
  4:45pm –  6:00pm M Deconstructing ColdFusion
Day 2 - Web Apps
  4:45pm –  6:00pm L Carmen Sandiego is On the Run!
Day 2 - Privacy
  4:45pm –  6:00pm N Goodware drugs for malware: on-the-fly malware analysis and containment
Day 2 - Reverse Engineering Redux
  4:45pm –  6:00pm R Cryptographic Agility: Defending Against the Sneakers Scenario
Day 2 - Where the Data Lives
  4:45pm –  10:45pm S dirtbox, a highly scalable x86/Windows Emulator
Day 2 - Cloud Virtualization
  5:15pm –  5:45pm F Lifting the fog
Day 2 - Turbo Talks
  5:45pm –  7:00pm F Security is not a four letter word
Day 2 - Turbo Talks
  6:00pm –  6:15pm G Conference Ends
Break