Content List:-
![](https://encryptedhacks.org/wp-content/uploads/2023/09/BLACKHAT-1-1024x576.png)
- BitLeaker- Subverting BitLocker with One Vulnerability
- Complexity Killed Security
- Engineering Cybersecurity for a Nation- What Singapore is Learning from Cars and Sanitation
- The Black Hat NOC- Greatest Hits and Holy…Cows
- Escaping Virtualized Containers
- Patching Loopholes- Finding Backdoors in Applications
- What the Log-! So Many Events, so Little Time
- Securing the Next Version of HTTP- How QUIC and HTTP3 Compare to HTTP2
- Misuse of DNS, the Second Most Used Protocol
- Faking a Factory- Creating and Operating a Realistic Honeypot
- Raiden Glitching Framework
- First Contact – Vulnerabilities in Contactless Payments
- The Evil Alt-Ego- (ab)using HTTP Alternative Services
- The Evil of Spy Camera
- Walking Your Dog in Multiple Forests – Breaking AD Trust Boundaries through Kerberos Vulnerabilities
- CDPwn- Taking Over Millions of Enterprise-Things with Layer 2 Zero-Days
- WIFI-Important Remote Attack Surface- Threat is Expanding
- Biometrics & Privacy- Time to Faceoff or is that FaceApp
- Attacking and Defending Machine Learning Applications of Public Cloud
- Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale
- Redback- Advanced Static Binary Injection
- Store-to-Leak Forwarding- There and Back Again
- ZombieLoad- Leaking Data on Intel CPUs
- Back to the Future. Cross-Protocol Attacks in the Era of 5G
- 3d Red Pill- A Guest-to-Host Escape on QEMUKVM Virtio Device
- Page Cache Attacks- Microarchitectural Attacks on Flawless Hardware
- Wi-Fi Brokering
- May the Trust be with You- Empowering TrustZone-M with Multiple Trusted Environments
- Kr00k- How KRACKing Amazon Echo Exposed a Billion+ Vulnerable Wi-Fi Devices
- From an URGENT11 Vulnerability to a Full Take-Down of a Factory Using a Single Packet
- Hey Google, Activate Spyware! – When Google Assistant Uses a Vulnerability as a Feature
- Making an Impact from India to the Rest of the World by Building & Nurturing Women Infosec Community
- Demystify Today’s Binary Disassembling and How Modern ABI Makes it Easier
- Win the 0-Day Racing Game Against Botnet in Public Cloud
- Tracking the Criminal of Fake News Based on a Unified Embedding
- The Inside Story- There are Apps in Apps and Here is How to Break Them
- Adversary Detection Pipelines- Finally Making Your Threat Intel Useful
- Dynamic Binary Instrumentation Techniques to Address Native Code Obfuscation
- Locknote- Conclusions and Key Takeaways from Day 1
- Locknote- Conclusions and Key Takeaways from Day 2
0 Comments