Advanced AIX Heap Exploitation Methods
Adventures in Limited User Post Exploitation
Aleatory Persistent Threat
App Attack: Surviving the Mobile Application Explosion
Attacking Kerberos Deployments
Attacking Phone Privacy
Bad Memories
Balancing the Pwn Trade Deficit
Base Jumping: Attacking GSM Base Station Systems and Mobile Phone Base Bands
Becoming the six-million-dollar man
Black Ops Of Fundamental Defense: Web Edition
BlindElephant: WebApp Fingerprinting and Vulnerability Inferencing
Blitzableiter - the Release
Blue Screen Of the Death is Dead.
Breaking Browsers: Hacking Auto-Complete
Burning Asgard - What happens when Loki breaks free
Carmen Sandiego is On the Run!
CLOUDINOMICON: Idempotent Infrastructure, Survivable Systems & Bringing Sexy Back to Info Centricity
Cloud Security Alliance Summit
Constricting the Web: Offensive Python for Web Hackers
Crash Analysis using BitBlaze
Cryptographic Agility: Defending Against the Sneakers Scenario
CSI: TCP/IP
Cyber war...Are we at war? And if we are, how should we fight it?
Deconstructing ColdFusion
Defenseless in Depth
dirtbox: a Highly Scalable x86/Windows Emulator
Drivesploit: Circumventing both automated AND manual drive-by-download detection
Electricity for Free? The Dirty Underbelly of SCADA and Smart Meters
Elevation of Privilege: The Easy way to Threat Model
Everybody be cool this is a roppery!
Ex-Fed Confessions
Exploiting the Forest with Trees
Exploiting Timing Attacks in Widespread Systems
ExploitSpotting: Locating Vulnerabilities Out Of Vendor Patches Automatically
Extreme-range RFID tracking
Finger Pointing for Fun, Profit and War?
Getting In Bed With Robin Sage
Goodware drugs for malware: on-the-fly malware analysis and containment
GWT Security: Don’t Get Distracted by Bright Shiny Objects
Hacker Court
Hacking and protecting Oracle Database Vault
Hacking Browser's DOM - Exploiting Ajax and RIA
Hacking Java Clients
Hacking Oracle From Web Apps
Hadoop Security Design? Just Add Kerberos? Really?
Harder, Better, Faster, Stronger: Semi-Auto Vulnerability Research
How I Met Your Girlfriend
How to Hack Millions of Routers
HTTPS Can Byte Me
Human Intel
Industrial Bug Mining - Extracting, Grading and Enriching the Ore of Exploits
ISC SIE Passive DNS vs. Apache Cassandra
ISSA
Jackpotting Automated Teller Machines Redux
JavaSnoop: How to Hack Anything Written in Java
Keeping the Good Stuff In: Confidential Information Firewalling with the CRM114 Spam Filter & Text Classifier
Keynote
Lifting the Fog
Lord of the Bing: Taking back search engine hacking from Google and Bing
Malware Attribution: Tracking Cyber Spies and Digital Criminals
Malware Freak Show 2010: The Client-Side Boogaloo
Mastering the Nmap Scripting Engine
Meet the Feds Reception
Memory Corruption Attacks: The (almost) Complete History...
Microsoft Powershell - It's time to own
mod_antimalware: A Novel Apache Module for Containing web-based Malware Infections
More Bugs In More Places: Secure Development On Moble Platforms
Need a hug? I'm secure.
NEPTUNE: Dissecting Web-based Malware via Browser and OS Instrumentation
Network Stream Debugging with Mallory
New Threats to Privacy: From TIA to Google
One on One Interview with General (Ret.) Michael V. Hayden
Optimizing the Security Researcher and CSO Relationship
Payload Already Inside: Data Re-Use for ROP exploits
Policy, Privacy, Deterrence and Cyber War
PSUDP: A Passive Approach to Network-Wide Covert Communication
pyREtic – Reversing obfuscated Python bytecode & live Python objects
Reception: Security Innovation Network
Regional Collegiate Cyberdefense Competition
Return-Oriented Exploitation
Reverse Engineering with Hardware Debuggers
SAP Backdoors: A Ghost at the Heart of Your Business
SCADA and ICS for Security Experts: How to avoid Cyberdouchery
Secure Use of Cloud Storage
Security Innovation Network: Connecting Buyers, Builders, and the Research Community
Security is Not a Four Letter Word
Social Networking Special Ops: Extending Data Visualization Tools for faster Pwnage
SpewPAL: How capturing and replaying attack traffic can save your IDS
Standing on the Shoulders of the Blue Monster: Hardening Windows Applications
State of SSL on the Internet: 2010 Survey, Results and Conclusions Routers
Systemic DNS Vulnerabilities and Risk Management: A Discussion With the Experts
The Black Art of Binary Hijacking
The DMCA & ACTA vs. Academic & Professional Research: How Misuse of this Intellectual Property Legislation Chills Research, Disclosure and Innovation
The Emperor Has No Clothes: Insecurities in Security Infrastructure
There's a party at Ring0 (and you're invited)
These Aren't the Permissions You're Looking For
Things You Wanted To Know But Were Afraid To Ask About Managing Your Information Security Career
TitanMist: Your First Step to Reversing Nirvana
Token Kidnapping's Revenge
Unauthorized Internet Wiretapping: Exploiting Lawful Intercept
Understanding the Low- Fragmentation Heap: From Allocation to Exploitation
Understanding the Windows SMB NTLM Weak Nonce Vulnerability
USB - HID, The Hacking Interface Design
Ushering in the Post-GRC World: Applied Threat Modeling
Utilizing Code Reuse/Return Oriented Programming in PHP Web Application Exploits
Virt-ICE: Next Generation Debugger for Malware Analysis
Virtual Forensics
Virtually Pwned: Pentesting Virtualization
Voyage of the Reverser: A Visual Study of Binary Species
Wardriving the Smart Grid: Practical Approaches to Attacking Utility Packet Radios
Welcome & Introduction to Black Hat USA 2010
WPA Migration Mode: WEP is back to haunt you…
Your Career = Your Business
You Will be Billed $90,000 for This Call