Black Hat USA 2012 Program Guide
Total Page:16
File Type:pdf, Size:1020Kb
SUSTAINING SPONSORS Black Hat AD FINAL.pdf 1 6/30/12 8:12 PM C M Y CM MY CY CMY K Black Hat AD FINAL.pdf 1 6/30/12 8:12 PM SCHEDULE WELCOME TABLE OF CONTENTS Schedule . 4-7 Welcome to Las Vegas, and thank you for your participation in the growing Black Hat community. As we celebrate our 15th anniversary, we believe that the event Briefi ngs . 8-24 continues to bring you timely and action packed briefi ngs from some of the top Workshops . 21 security researchers in the world. Security saw action on almost every imaginable front in 2012. The year started Turbo Talks . 23 with a massive online protest that beat back US-based Internet blacklist legislation Speakers . 25-39 including SOPA and PIPA, echoed by worldwide protests against adopting ACTA in the European Union. Attackers showed no signs of slowing as Flame Keynote Bio . 25 replaced Stuxnet and Duqu as the most sophisticated malware yet detected. The Floorplan . 40-41 Web Hacking Incident Database (WHID) has added LinkedIn, Global Payments, eHarmony and Zappos.com while Anonymous and other politically motivated groups Arsenal . 42-51 have made their presence known in dozens of attacks. Special Events . 52-53 No matter which incidents you examine—or which ones your enterprise must C respond to—one thing is clear: security is not getting easier. The industry relies upon Stay Connected + More . 54 M the Black Hat community to continue our research and education, and seeks our Sponsors . 55 guidance in developing solutions to manage these threats. Y Black Hat USA 2012 features nine tracks and fourty-nine live, onstage CM demonstrations presented by over one hundred of the community’s best and MY brightest. We’re particularly excited about this year’s keynote speakers, Shawn Henry, former FBI Executive Assistant Director (EAD) and the current President of CY CrowdStrike Services; and Neal Stephenson, one of the world's foremost historical CMY and science fi ction authors. Shawn will take the stage to offer new insights on how UPCOMING EVENTS: K a hostile cyber environment has rendered traditional security obsolete while Neal will take the stage for an interactive interview. Black Hat Training: HALO Summit 2012 The Arsenal returns for its third year, offering researchers and the open source San Diego, CA October 29-November 2 community a platform to demonstrate tools they develop and use in their daily Black Hat UAE 2012 professions. Abu Dhabi, United Arab Emirates December 10-13 I would like to ask for your help with two items: Black Hat EU 2013 U Keep your eye open for the review board members, and give them a hearty thank-you. This team spent countless hours reviewing over 500 submissions; Amsterdam, The Netherlands March 11-14 their guidance ensures that the show remains connected to its roots. Black Hat USA 2013 U Please fi ll out your surveys! Black Hat is the most important security event of the year, and our ethos remains focused on the community. We need to hear from Las Vegas, Nevada July 27-August 1 you! Whether it’s your fi rst Black Hat or your fi fteenth, I want to encourage all attendees reach out and connect. This event offers unique opportunities for STAY CONNECTED professional growth, while providing access to a very niche population—nowhere else on earth will you have this kind of access to researchers, technology experts Twitter: Twitter.com/Black HatEvents and Black Hat sponsors. We hope you enjoy this year’s show! Facebook: Facebook.com/Black Hat Trey Ford General Manager LINKED.IN: search for “Black Hat” on LinkedIN Groups Black Hat 3 SCHEDULE / WED, JULY 25 Time Track 1 Track 2 Track 3 Track 4 Track 5 Track 6 Track 7 Track 8 Track 9 Track Defi ning the Scope Upper Layers Lower Layers Mobile Defense Breaking Things Gnarly Problems Applied Workshop I Applied Workshop II Track Chair: Vincenzo Iozzo Track Chair: Shawn Moyer Track Chair: Chris Rohlf ROOM Augustus III + IV Augustus I + II Augustus V + VI Palace I Palace II Palace III Romans I-IV Florentine Pompeian 08:00-12:00 REGISTRATION: Emperiors Ballroom 08:00-08:50 BREAKFAST: Octavius Ballroom—Sponsored by 08:50-09:00 Jeff Moss: Welcome & Introduction to Black Hat USA 2012: Augustus Ballroom 09:00-10:00 Keynote Speaker: Shawn Henry: Augustus Ballroom 10:00-10:15 Break 10:15-11:15 Smashing the Future for Fun and Profi t Advanced ARM Exploitation SexyDefense: Maximizing the A Stitch in Time Saves Nine: File Disinfection Framework: <GHZ or Bust: Black Hat Advanced Chrome Extension with Jeff Moss, Adam Shostack, Marcus Ranum, Bruce Schneier by Stephen Ridley + Stephen Lawler Home-Field Advantage A Case of Multiple Operating Striking Back at Polymorphic by Atlas Exploitation: Leveraging API Moderated by Jennifer Granick by Iftach Ian Amit System Vulnerability Viruses Powers for The Better Evil by Rafal Wojtczuk by Mario Vuksan + by Kyle Osborn + Tomislav Pericin Krzysztof Kotowicz 11:15-11:45 Coffee Service—Sponsored by 11:45-12:45 Black Ops Google Native Client: Analysis Of A How The Analysis of Electrical Scaling Up Baseband Attacks: The Defense RESTs: Automation Expoiting The Jemalloc Memory Confessions of a WAF Developer: <GHZ or Bust: Black Hat cont. Advanced Chrome Extension by Dan Kaminsky Secure Browser Plugin Sandbox Current Consumption of Embedded More (unexpected) Attack Surface and APIs for Improving Security Allocator: Owning Firefox’s Heap Protocol-Level Evasion of Web Exploitation: Leveraging API by Chris Rohlf Systems Could Lead to Code by Ralf-Philipp Weinmann by David Mortmon by Patroklos Argyroudis + Application Firewalls Powers for The Better Evil cont. Reversing? Chariton Karamitas by Ivan Ristic by Yann Allain + Julien Moinard 12:45-14:15 Lunch: Forum Ballroom—Sponsored by 14:15-15:15 CuteCats.exe and The Arab Spring ModSecurity as Universal Cross- Looking Into the Eye of The Meter Don’t Stand So Close To Me: Control-Alt-Hack(TM): The Info Leak Era on Software Torturing OpenSSL Code Reviewing Web Application Linux Interactive Exploit by Morgan Marquis-Boire platform Web Protection Tool by Don C. Weber An Analysis of the NFC Attack White Hat Hacking for Fun & Exploitation by Valeria Bertacco Framework Based Applications Development with GDB and by Greg Wroblewski + Ryan Barnett Surface Profi t (A Computer Security by Fermin J. Serna (Struts 2, Spring MVC, Ruby on PEDA The Last Gasp of the Industrial by Charlie Miller Card Game) Rails (Groovy on Grails), .NET by Long Le Air-Gap... HTExploit bypassing htaccess by Tadayoshi Kohno + MVC) by Eireann Leverett restrictions Tamara Denning + by Abraham Kang by Maximiliano Soler + Matias Katz Adam Shostack STIX: The Structured Threat Information eXpression libinjection: A C library for SQLi by Sean Barnum detection and generation through lexical analysis of real world attacksTurbo by Nick Galbreath 15:15-15:30 Break / Booksigning with the authors of “iOS Hacker’s Handbook”: Palace Pre-Function 15:30-16:30 Errata Hits Puberty: 13 Years of PRNG: Pwning Random Number Windows 8 Heap Intervals Probing Mobile Operator Networks Intrusion Detection Along the Are You My Type?-Breaking.net WebTracking For You Code Reviewing Web Application Linux Interactive Exploit Chagrin Generators (in PHP applications) by Chris Valasek + Tarjei Mandt by Collin Mulliner Kill Chain: Why your Detection Sandboxes Through Serialization by Gregory Fleischer Framework Based Applications Development with GDB and by Jericho by George Argyros + Aggelos Kiaylas System Sucks and What to Do by James Forshaw (Struts 2, Spring MVC, Ruby on PEDA cont. About it Rails (Groovy on Grails), .NET by John Flynn MVC) cont. 16:30-17:00 Coffee Service—Sponsored by 17:00-18:00 The Myth of Twelve More Bytes: Owning Bad Guys {and Mafi a} Ghost is in the Air(traffi c) Adventures in Bouncer Land Exploit Mitigation Improvements PinPadPwn Here Be Backdoors: Code Reviewing Web Application From the Iriscode to the Iris: Security on the Post-Scarcity Internet with Javascript Botnets by Andrei Costin by Nicholas Percoco + Sean Schulte in Windows 8 by Nils + A Journey Into the Secrets of Framework Based Applications A New Vulnerability of Iris by Alex Stamos + Tom Ritter by Chema Alonso by Matt Miller + Ken Johnson Rafael Dominguez Vega Industrial Firmware (Struts 2, Spring MVC, Ruby on Recognition Systems by Ruben Santamarta Rails (Groovy on Grails), .NET by Javier Galbally MVC) cont. 18:00-19:30 Reception: Octavius Ballroom—Sponsored by our Diamond, Platinum, Gold Sponsors 18:15-19:30 PWNIE awards: Augustus III + IV 4 SCHEDULE / WED, JULY 25 Time Track 1 Track 2 Track 3 Track 4 Track 5 Track 6 Track 7 Track 8 Track 9 Track Defi ning the Scope Upper Layers Lower Layers Mobile Defense Breaking Things Gnarly Problems Applied Workshop I Applied Workshop II Track Chair: Vincenzo Iozzo Track Chair: Shawn Moyer Track Chair: Chris Rohlf ROOM Augustus III + IV Augustus I + II Augustus V + VI Palace I Palace II Palace III Romans I-IV Florentine Pompeian 08:00-12:00 REGISTRATION: Emperiors Ballroom 08:00-08:50 BREAKFAST: Octavius Ballroom—Sponsored by 08:50-09:00 Jeff Moss: Welcome & Introduction to Black Hat USA 2012: Augustus Ballroom 09:00-10:00 Keynote Speaker: Shawn Henry: Augustus Ballroom 10:00-10:15 Break 10:15-11:15 Smashing the Future for Fun and Profi t Advanced ARM Exploitation SexyDefense: Maximizing the A Stitch in Time Saves Nine: File Disinfection Framework: <GHZ or Bust: Black Hat Advanced Chrome Extension with Jeff Moss, Adam Shostack, Marcus Ranum, Bruce Schneier by Stephen Ridley + Stephen Lawler Home-Field Advantage A Case of Multiple Operating Striking Back at Polymorphic by Atlas Exploitation: Leveraging API Moderated by Jennifer Granick by Iftach Ian Amit System Vulnerability Viruses Powers for The Better Evil by Rafal Wojtczuk by Mario Vuksan + by Kyle Osborn + Tomislav Pericin Krzysztof Kotowicz 11:15-11:45 Coffee Service—Sponsored by 11:45-12:45 Black Ops Google Native Client: Analysis Of A How The Analysis of Electrical Scaling Up Baseband Attacks: The Defense RESTs: Automation Expoiting The Jemalloc Memory Confessions of a WAF Developer: <GHZ or Bust: Black Hat cont.