Welcome & Introduction to Black Hat USA 2010
Keynote
ExploitSpotting: Locating Vulnerabilities Out Of Vendor Patches Automatically
Crash Analysis using BitBlaze
Jackpotting Automated Teller Machines Redux
Blue Screen Of the Death is Dead.
Memory Corruption Attacks: The (almost) Complete History...
There's a party at Ring0 (and you're invited)
Return-Oriented Exploitation
Understanding the Low- Fragmentation Heap: From Allocation to Exploitation
Advanced AIX Heap Exploitation Methods