Download Briefing Schedule
Total Page:16
File Type:pdf, Size:1020Kb
WED. JULY 31 07:00-17:00 REGISTRATION 08:00-08:50 BREAKFAST Sponsored by / Forum Ballroom ROOM Roman II Roman IV Roman I / III Palace II Palace III Augustus V / VI Palace I Augustus I / II Augustus III / IV 08:50-09:00 Welcome & Introduction to Black Hat USA 2013 / Augustus Ballroom 09:00-10:00 Keynote Speaker: General Keith B. Alexander / Augustus Ballroom 10:00-10:15 Break 10:15-11:15 Mainframes: The Past Will BlackberryOS 10 From a Security With BIGDATA comes BIG New Trends in FastFlux Networks Lessons from Surviving a Combating the Insider Threat Beyond the Application: Cellular Java Every-Days: Exploiting How to Build a SpyPhone Come to Haunt You Perspective responsibility: Practical (Wei Xu + Xinran Wang) 300Gbps Denial of at the FBI: Real-world Lessons Privacy Regulatory Space Software Running on Three (Kevin McNamee) (Philip Young) (Ralf-Philipp Weinmann) exploiting of MDX injections Service Attack Learned (Christie Dudley) Billion Devices (Dmitry Chastuhin) (Matthew Prince) (Patrick Reidy) (Brian Gorenc + CrowdSource: An Open Source, Jasiel Spelman) Crowd Trained Machine Learning Legal Considerations for Model for Malware Detection Cellular Research (Joshua Saxe) (Marcia Hofmann) TM 11:15-11:45 Coffee Service Sponsored by / Octavius Ballroom 11:45-12:45 Black-box Assessment of Shattering Illusions in Lock-Free Power Analysis Attacks for Denying Service to DDoS What Security Researchers Just-In-Time Code Reuse: The A Tale of One Software Bypass TLS 'Secrets' Million Browser Botnet Pseudorandom Algorithms Worlds: Compiler/Hardware Cheapskates Protection Services Need to Know About More Things Change, the More of Windows 8 Secure Boot (NextGen$) (Jeremiah Grossman + (Derek Soeder + Behaviors in OSes and VMs (Colin O'Flynn) (Allison Nixon) Anti-Hacking Law They Stay the Same (Yuriy Bulygin + Matt Johansen) Christopher Abad + (Marc Blanchou) (Marcia Hofmann) (Kevin Snow + Lucas Davi) Oleksandr Bazhaniuk + Gabriel Acevedo) Andrew Furtak) Denial of Service as a Service - Password Hashing: Asymmetrical Warfare at its Finest The Future is Now (Robert Masse) (JP Aumasson) 12:45-14:15 Lunch Sponsored by / Forum Ballroom 14:15-15:15 End-to-end Analysis of Domain Pass the Hash and Other Credential Flying In the Dark - All the Things Universal DDoS Legal Aspects of BIOS Security I Can Hear You Now: Traffic Lawful Access Panel (Matt Evading Deep Inspection for Generating Algorithm Malware Theft and Reuse: Mitigating the risk Not to Do When Hacking Hardware Mitigation Bypass Full-spectrum Computer (John Butterworth + Interception and Remote Blaze & Brewster Kahle & Fun and Shell Family of Lateral Movement and Privilege (Matthew Watchinski) (Tony Miu + Albert Hui + Wai Leng) Network (Active) Defense Corey Kallenberg + Mobile Phone Cloning with a Jennifer Valentino-DeVries & (Opi Niemi + Antti Levomäki) (Jason Geffner) Escalation (Robert Clark) Xeno Kovah) Compromised CDMA Femtocell Alan Davidson) (Mark Simos + Patrick Jungles) (Tom Ritter + Doug DePerry + Andrew Rahimi) 15:15-15:30 Break 15:30-16:30 JavaScript Static Security Analysis How to grow a TREE (Taint-Enabled Maltego Tungsten As a Untwining Twine A Practical Attack Against MDM TOR… ALL-THE-THINGS! Buying into the Bias: Why Clickjacking Revisited: Let's Get Physical: Breaking Made Easy with JSPrime Reverse Engineering Environment) Collaborative Attack Platform (Jon Chittenden + Anson Gomes) Solutions (Jason Geffner) Vulnerability Statistics Suck A Perceptual View of UI Home Security Systems and (Nishant Das Patnaik + from a CBASS (Cross-platform (Roelof Temmingh + (Daniel Brodie + (Jericho + Steve Christey) Security Bypassing Building Controls Sarathi Sabyasachi Sahoo) Binary Automated Symbolic- Andrew MacPherson) Michael Shaulov) (Devdatta Akhawe) (Drew Porter + Stephen Smith) execution System) LTE Booms with Vulnerabilities Truncating TLS Sessions to (Nathan Li + Loc Nguyen + (Ankit Gupta) Violate Beliefs Xing Li + James Just) (Ben Smyth + Alfredo Pironti) OPSEC Failures of Spies (Matthew Cole) 16:30-17:00 Coffee Service Sponsored by / Octavius Ballroom 17:00-18:00 The Web IS Vulnerable: XSS Predicting Susceptibility to BinaryPig - Scalable Malware Smashing the Font Scaler Engine in Pixel-Perfect Timing Attacks Hacking, Surveilling, and How CVSS is DOSsing Your Hiding @ Depth - Exploring, Mactans: Injecting Malware Defense on the BattleFront Socialbots on Twitter Analytics in Hadoop Windows Kernel with HTML5 Deceiving Victims on Smart TV Patching Policy (and wasting Subverting, and Breaking NAND Into iOS Devices via Malicious (Greg Wroblewski + Ryan Barnett) (Chris Sumner + Randall Wald) (Zachary Hanif + Telvis Calhoun + (Ling Chuan Lee + Lee Yee Chan) (Paul Stone) (SeungJin 'Beist' Lee) your money) Flash Memory Chargers Jason Trost) (Luca Allodi + Fabio Massacci) (Josh 'm0nk' Thomas) (Billy Lau + Yeongjin Jang + Chengyu Song) Malicious File for Exploiting Forensic Software (Takahiro Haruyama + Hiroshi Suzuki) 17:30-19:00 Sponsor Hall Reception Sponsored by: Diamond, Platinum Plus, Platinum Sponsors / Octavius Ballroom 18:30-19:30 PWNIE Awards / Augustus III/IV KEY: AppSec DDoS Malware Cellular Hardware/Low Level Social Mobile SCADA/ICS Network Defense Exploit Development Management Crypto Consumer WED. JULY 31 Workshops Sponsored Workshops Arsenal Presentations ROOM Pompeian Florentine Milano Ballroom VII Milano Ballroom VIII Milano Ballroom III Milano Ballroom 10:15-11:15 Wireless Penetration Testing with Defense Evasion Modeling – How to Avoid Becoming the Next ThreadFix the Pwn Pad Bypassing the Cyber Kill Chain: Watering Hole by Dan Cornell Sponsored by: Pwnie Express What's Getting Past Your Layered Sponsored by: RiskIQ Security? Xenotix xBOT by Ajin Abraham Practical Pentesting of ERPs and Business Applications Methodologies of Hacking Embedded Security Appliances Sponsored by: NSS Labs 11:15-11:45 (Alexander Polyakov + Alexey Tyurin) (Rob Bathurst + Mark Carey) Coffee/Refreshments Break - Sponsored Workshop & Arsenal Reception Room 11:45-12:45 How to Pentest 1000 Branch Offices Defense Evasion Modeling – Demystifying Mobile Application SocialKlepto Sponsored by: Pwnie Express Bypassing the Cyber Kill Chain: Security: Improve Your Approach to by Jason Ding Tracking & Understanding Modern Blacklisting Apps Malware & Exploits Sponsored by: RiskIQ Ice-hole Sponsored by: NSS Labs by Darren Manners 12:45-14:15 Lunch/Learn Mixer - Sponsored Workshop & Arsenal Reception Room Lunch Sponsored by 14:15-15:15 The Spikes Challenge: Solving the The Hangover Cyber Espionage Report – “Kaizen” a CTF iMAS - iOS Mobile Application Security Browser Malware Epidemic Tools, Tactics and Tracking Sponsored by: Booz Allen Hamilton Libraries Sponsored by: Spikes Sponsored by: Norman Shark by Gregg Ganley Vscan PDF Attack: A Journey from the Exploit Kit to the Shellcode by Federico Massa 15:15-15:30 Embedded Devices Security and Firmware RE (Jose Miguel Esparza) Coffee/Refreshments Break - Sponsored Workshop & Arsenal Reception Room (Jonas Zaddach + Andrei Costin) 15:30-16:30 The Spikes Challenge: Solving the The Hangover Cyber Espionage Report – “Kaizen” a CTF ShellNoob Browser Malware Epidemic Tools, Tactics and Tracking Sponsored by: Booz Allen Hamilton by Yanick Fratantonio Sponsored by: Spikes Sponsored by: Norman Shark Dude, WTF in My Car? By Alberto Garcia Illera + Javier Vazquez Vidal 16:30-18:00 Afternoon Mixer - Sponsored Workshop & Arsenal Reception Room 17:00-18:00 To be Announced Sponsored by Arsenal Milano Ballroom Milano Ballroom Station 1 Station 2 Station 3 Station 4 Station 5 Station 6 Station 7 Station 8 10:00-12:30 OSfooler: Remote OS Fingerprinting WebVerify RAFT 3 PyPTP Smartphone Pentest Framework FSFlow ShellNoob Vscan is Over by Luis Antonio Rosales Marco by Gregory Fleischer + by Matthew Bergin by Georgia Weidman by Pat McCoy by Yanick Fratantonio by Federico Massa by Jaime Sanchez Nathan Hamiel 12:30-12:45 Break 12:45-15:15 JMSDigger ThreadFix Lair The Cat's Meow ThunderCell Dude, WTF in My Car? Automated Electromechanical PIN Xenotix xBOT by Gursev Singh Kalra by Dan Cornell by Tom Steele by Taylor Pennington by Georgia Weidman by Alberto Garcia Illera + Cracking: R2B2 and C3BO by Ajin Abraham Javier Vasquez Vidal by Justin Engler 15:15-15:30 Break KEY: AppSec DDoS Malware Cellular Hardware/Low Level Social Mobile SCADA/ICS Network Defense Exploit Development Management Crypto Consumer THU. AUGUST 1 08:00-08:50 BREAKFAST sponsored by / Forum Ballroom 08:30-16:00 REGISTRATION ROOM Roman II Roman IV Roman I / III Palace II Palace III Augustus V / VI Palace I Augustus I / II Augustus III / IV 09:00-10:00 Keynote Speaker: Brian Muirhead / Augustus Ballroom 10:00-10:15 Break 10:15-11:15 CMX: IEEE Clean File Metadata Pass-the-Hash 2: The Admin's Abusing Web APIs Through Scripted The SCADA That Didn't Cry Wolf Mobile Rootkits: Exploiting and Fully Arbitrary 802.3 Packet Bluetooth Smart: The Good, the Honey, I'm Home!! - Hacking The Factoring Dead: Preparing Exchange Revenge Android Applications - Who's Really Attacking Your ICS Rootkitting ARM TrustZone Injection: Maximizing the Bad, the Ugly, and the Fix! Z-Wave Home Automation for Cyptopocalypse (Mark Kennedy + Igor Muttik) (Skip Duckwall) (Daniel Peck) Devices - Part Deux! (Thomas Roth) Ethernet Attack Surface (Mike Ryan) Systems (Alex Stamos + (Kyle Wilhoit) (Andrea Barisani + (Behrang Fouladi + Thomas Ptacek + Daniele Bianco) Sahand Ghanoun) Tom Ritter) Big Data for Web Application Mobile Malware: Why the Security Traditional AV Paradigm is Doomed, and How to Use Physics to Detect (Mike Arpaia + Kyle Barry) Undesirable