SCHEDULE / WED, JULY 25

Time Track 1 Track 2 Track 3 Track 4 Track 5 Track 6 Track 7 Track 8 Track 9 Track Defi ning the Scope Upper Layers Lower Layers Mobile Defense Breaking Things Gnarly Problems Applied Workshop I Applied Workshop II Track Chair: Vincenzo Iozzo Track Chair: Shawn Moyer Track Chair: Chris Rohlf ROOM Augustus III + IV Augustus I + II Augustus V + VI Palace I Palace II Palace III Romans I-IV Florentine Pompeian 08:00-12:00 REGISTRATION: Emperiors Ballroom 08:00-08:50 BREAKFAST: Octavius Ballroom—Sponsored by 08:50-09:00 Jeff Moss: Welcome & Introduction to Black Hat USA 2012: Augustus Ballroom 09:00-10:00 Keynote Speaker: Shawn Henry: Augustus Ballroom 10:00-10:15 Break 10:15-11:15 Smashing the Future for Fun and Profi t Advanced ARM Exploitation SexyDefense: Maximizing the A Stitch in Time Saves Nine: File Disinfection Framework:

4 SCHEDULE / WED, JULY 25

Time Track 1 Track 2 Track 3 Track 4 Track 5 Track 6 Track 7 Track 8 Track 9 Track Defi ning the Scope Upper Layers Lower Layers Mobile Defense Breaking Things Gnarly Problems Applied Workshop I Applied Workshop II Track Chair: Vincenzo Iozzo Track Chair: Shawn Moyer Track Chair: Chris Rohlf ROOM Augustus III + IV Augustus I + II Augustus V + VI Palace I Palace II Palace III Romans I-IV Florentine Pompeian 08:00-12:00 REGISTRATION: Emperiors Ballroom 08:00-08:50 BREAKFAST: Octavius Ballroom—Sponsored by 08:50-09:00 Jeff Moss: Welcome & Introduction to Black Hat USA 2012: Augustus Ballroom 09:00-10:00 Keynote Speaker: Shawn Henry: Augustus Ballroom 10:00-10:15 Break 10:15-11:15 Smashing the Future for Fun and Profi t Advanced ARM Exploitation SexyDefense: Maximizing the A Stitch in Time Saves Nine: File Disinfection Framework:

5 SCHEDULE / THU, JULY 26

Time Track 1 Track 2 Track 3 Track 4 Track 5 Track 6 Track 7 Track 8 Track 9 Track Big Picture Web Apps Malware Enterprise Intrigue 92.2% Market Share Over the Air and Mass Effect Applied Workshop I Applied Workshop II Track Chair: Nathan Hamiel Track Chair: Stefano Zanero In the Device ROOM Augustus III + IV Augustus I + II Augustus V + VI Palace I Palace II Palace III Romans I-IV Florentine Pompeian 08:00-11:00 REGISTRATION: Emperiors Ballroom

08:00-08:50 BREAKFAST: Octavius Ballroom—Sponsored by 09:00-10:00 Keynote Speaker: Neal Stephenson: Augustus Ballroom 10:00-10:15 Break / Booksigning with Neal Stephenson: Palace Pre-Function 10:15-11:15 Trust, Security, and Society HTML5 Top 10 Threats: Stealth A Scientifi c ( but not academic) Catching Insider Data Theft With Exploitation of Windows 8 Metro iOS Security Still Passing the Hash 15 Years Lessons of Binary Analysis The Dark Art of IOS Application by Bruce Schneier Attacks and Silent Exploits Study of Malware Employs Anti- Stochastic Forensics Style Apps by Dallas De Atley Later? Using the Keys to the by Chrstien Rioux Hacking by Shreeraj Shah Debugging, Anti-disassemly, and by Jonathan Grier by Sung-ting Tsai + Kingdom to Access all Your Data by Jonathan Zdziarski Anti-virtualization Technologies Ming-chieh Pan by Alva Duckwall + by Rodrigo Branco Christopher Campbell 11:15-11:45 Coffee Service—Sponsored by / Booksigning with Bruce Schneier: Palace Pre-Function 11:45-12:45 The Christopher Columbus Rule AMF Testing Made Easy De Mysteriis Dom Jobsivs: Find Me in Your Database: We have you by the Gadgets iOS Kernel Heap Armageddon Recent Java Exploitation Trends Lessons of Binary Analysis cont. The Dark Art of IOS Application and DHS by Luca Carettoni Mac Efi Rootkits An Examination of Index Security by Mickey Shkatov + Revisited and Malware Hacking cont. by Mark Weatherford by Loukas K by David Litchfi eld Toby Kohlenberg by Stefan Esser by Jeong Wook Oh 12:45-14:15 Lunch: Forum Ballroom—Sponsored by 14:15-15:15 Legal Aspects of Cyberspace Hacking with WebSockets Dex Education: Practicing Safe Dex Passive Bluetooth Monitoring in Exchanging Demands When Security Gets in the Way: Digging Deep Into The Flash SNSCat: What You Don’t Ruby for Pentesters: Operations by Sergey Shekyan + by Timothy Strazzere Scapy by Peter Hannay Tools for PenTesting Mobile Apps Sandboxes Know About Sometimes Hurts The Workshop by Robert Clark Vaagan Toukharian by Ryan Holeman That Use Certifi cate Pinning by Paul Sabanal + the Most by Cory Scott + by Alban Diquet + Mark Vincent Yason by Dan Gunter + Michael Tracy + SYNful Deceit, Stateful Subterfuge Justine Osborne Solomon Sonya Timur Duehr by Tom Steele + Chris Patten Embedded Device Firmware Vulnerability Hunting Using FRAK Stamp Out Hash Corruption, by Ang Cui Crack All The Things by Ryan Reynolds + Mapping and Evolution of Jonathan Claudius Android Permissions by Andrew Reiter + Zach Lanier 15:15-15:30 Break 15:30-16:30 Targeted Intrusion Remediation: Blended Threats and JavaScript: Hardware Backdooring is Practical Clonewise: Automated Package Windows Phone 7 Internals and iOS Application Security SQL Injection to MIPS Overfl ows: Mobile Network Forensics Ruby for Pentesters: Lessons From The Front Lines A Plan for Permanent Network by Jonathan Brossard Clone Detection Exploitability Assessment and Automation: Rooting SOHO Routers with Eric Fulton The Workshop cont. by Jim Aldridge Compromise by Silvio Cesare by Tsukasa Oi Introducing SIRA by Zachary Cutlip by Phil Purviance + by Justin Engler + Joshua Brashars Seth Law + Joshua Dubik + David Vo 16:30-17:00 Coffee Service—Sponsored by 17:00-18:00 Hacking the Corporate Mind: State of Web Exploit Toolkits Flowers for Automated Malware SSRF VS. Business Critical Easy Local Windows Kernel How Many Bricks does it take to Hookin’ Ain’t Easy: BeEF Mobile Network Forensics cont. Ruby for Pentesters: Using Social Engineering Tactics by Jason Jones Analysis Applications Exploitations crack a microcell? Injection with MITM The Workshop cont. to Improve Organizational Security by Chengyu Song + by Alexander Polyakov + by Cesar Cerrudo by Mathew Rowley by Steve Ocepek + Acceptance Paul Royal Dmitry Chastuhin Ryan Linn by James Philput

6 SCHEDULE / THU, JULY 26

Time Track 1 Track 2 Track 3 Track 4 Track 5 Track 6 Track 7 Track 8 Track 9 Track Big Picture Web Apps Malware Enterprise Intrigue 92.2% Market Share Over the Air and Mass Effect Applied Workshop I Applied Workshop II Track Chair: Nathan Hamiel Track Chair: Stefano Zanero In the Device ROOM Augustus III + IV Augustus I + II Augustus V + VI Palace I Palace II Palace III Romans I-IV Florentine Pompeian 08:00-11:00 REGISTRATION: Emperiors Ballroom

08:00-08:50 BREAKFAST: Octavius Ballroom—Sponsored by 09:00-10:00 Keynote Speaker: Neal Stephenson: Augustus Ballroom 10:00-10:15 Break / Booksigning with Neal Stephenson: Palace Pre-Function 10:15-11:15 Trust, Security, and Society HTML5 Top 10 Threats: Stealth A Scientifi c ( but not academic) Catching Insider Data Theft With Exploitation of Windows 8 Metro iOS Security Still Passing the Hash 15 Years Lessons of Binary Analysis The Dark Art of IOS Application by Bruce Schneier Attacks and Silent Exploits Study of Malware Employs Anti- Stochastic Forensics Style Apps by Dallas De Atley Later? Using the Keys to the by Chrstien Rioux Hacking by Shreeraj Shah Debugging, Anti-disassemly, and by Jonathan Grier by Sung-ting Tsai + Kingdom to Access all Your Data by Jonathan Zdziarski Anti-virtualization Technologies Ming-chieh Pan by Alva Duckwall + by Rodrigo Branco Christopher Campbell 11:15-11:45 Coffee Service—Sponsored by / Booksigning with Bruce Schneier: Palace Pre-Function 11:45-12:45 The Christopher Columbus Rule AMF Testing Made Easy De Mysteriis Dom Jobsivs: Find Me in Your Database: We have you by the Gadgets iOS Kernel Heap Armageddon Recent Java Exploitation Trends Lessons of Binary Analysis cont. The Dark Art of IOS Application and DHS by Luca Carettoni Mac Efi Rootkits An Examination of Index Security by Mickey Shkatov + Revisited and Malware Hacking cont. by Mark Weatherford by Loukas K by David Litchfi eld Toby Kohlenberg by Stefan Esser by Jeong Wook Oh 12:45-14:15 Lunch: Forum Ballroom—Sponsored by 14:15-15:15 Legal Aspects of Cyberspace Hacking with WebSockets Dex Education: Practicing Safe Dex Passive Bluetooth Monitoring in Exchanging Demands When Security Gets in the Way: Digging Deep Into The Flash SNSCat: What You Don’t Ruby for Pentesters: Operations by Sergey Shekyan + by Timothy Strazzere Scapy by Peter Hannay Tools for PenTesting Mobile Apps Sandboxes Know About Sometimes Hurts The Workshop by Robert Clark Vaagan Toukharian by Ryan Holeman That Use Certifi cate Pinning by Paul Sabanal + the Most by Cory Scott + by Alban Diquet + Mark Vincent Yason by Dan Gunter + Michael Tracy + SYNful Deceit, Stateful Subterfuge Justine Osborne Solomon Sonya Timur Duehr by Tom Steele + Chris Patten Embedded Device Firmware Vulnerability Hunting Using FRAK Stamp Out Hash Corruption, by Ang Cui Crack All The Things by Ryan Reynolds + Mapping and Evolution of Jonathan Claudius Android Permissions by Andrew Reiter + Zach Lanier 15:15-15:30 Break 15:30-16:30 Targeted Intrusion Remediation: Blended Threats and JavaScript: Hardware Backdooring is Practical Clonewise: Automated Package Windows Phone 7 Internals and iOS Application Security SQL Injection to MIPS Overfl ows: Mobile Network Forensics Ruby for Pentesters: Lessons From The Front Lines A Plan for Permanent Network by Jonathan Brossard Clone Detection Exploitability Assessment and Automation: Rooting SOHO Routers with Eric Fulton The Workshop cont. by Jim Aldridge Compromise by Silvio Cesare by Tsukasa Oi Introducing SIRA by Zachary Cutlip by Phil Purviance + by Justin Engler + Joshua Brashars Seth Law + Joshua Dubik + David Vo 16:30-17:00 Coffee Service—Sponsored by 17:00-18:00 Hacking the Corporate Mind: State of Web Exploit Toolkits Flowers for Automated Malware SSRF VS. Business Critical Easy Local Windows Kernel How Many Bricks does it take to Hookin’ Ain’t Easy: BeEF Mobile Network Forensics cont. Ruby for Pentesters: Using Social Engineering Tactics by Jason Jones Analysis Applications Exploitations crack a microcell? Injection with MITM The Workshop cont. to Improve Organizational Security by Chengyu Song + by Alexander Polyakov + by Cesar Cerrudo by Mathew Rowley by Steve Ocepek + Acceptance Paul Royal Dmitry Chastuhin Ryan Linn by James Philput

7