ADVANCED ARM EXPLOITATION
ADVENTURES IN BOUNCERLAND
AMF TESTING MADE EASY!
AN INTERVIEW WITH NEAL STEPHENSON
ARE YOU MY TYPE? - BREAKING .NET SANDBOXES THROUGH SERIALIZATION
A SCIENTIFIC (BUT NON ACADEMIC) STUDY OF HOW MALWARE EMPLOYS ANTI-DEBUGGING, ANTI-DISASSEMBLY AND ANTI-VIRTUALIZATION TECHNOLOGIES
A STITCH IN TIME SAVES NINE: A CASE OF MULTIPLE OPERATING SYSTEM VULNERABILITY
BLACK OPS
BLENDED THREATS AND JAVASCRIPT: A PLAN FOR PERMANENT NETWORK COMPROMISE
CATCHING INSIDER DATA THEFT WITH STOCHASTIC FORENSICS
CHANGING THE SECURITY PARADIGM....TAKING BACK YOUR NETWORK AND BRINGING PAIN TO THE ADVERSARY
CLONEWISE - AUTOMATED PACKAGE CLONE DETECTION
CONFESSIONS OF A WAF DEVELOPER: PROTOCOL-LEVEL EVASION OF WEB APPLICATION FIREWALLS
CONTROL-ALT-HACK(TM): WHITE HAT HACKING FOR FUN AND PROFIT (A COMPUTER SECURITY CARD GAME)
CUTECATS.EXE AND THE ARAB SPRING
DE MYSTERIIS DOM JOBSIVS: MAC EFI ROOTKITS
DEX EDUCATION: PRACTICING SAFE DEX
DIGGING DEEP INTO THE FLASH SANDBOXES
DON'T STAND SO CLOSE TO ME: AN ANALYSIS OF THE NFC ATTACK SURFACE
EASY LOCAL WINDOWS KERNEL EXPLOITATION
EMBEDDED DEVICE FIRMWARE VULNERABILITY HUNTING USING FRAK
ERRATA HITS PUBERTY: 13 YEARS OF CHAGRIN
EXCHANGING DEMANDS
EXPLOITING THE JEMALLOC MEMORY ALLOCATOR: OWNING FIREFOX'S HEAP
EXPLOIT MITIGATION IMPROVEMENTS IN WIN 8
FILE DISINFECTION FRAMEWORK: STRIKING BACK AT POLYMORPHIC VIRUSES
FIND ME IN YOUR DATABASE: AN EXAMINATION OF INDEX SECURITY
FLOWERS FOR AUTOMATED MALWARE ANALYSIS
FROM THE IRISCODE TO THE IRIS: A NEW VULNERABILITY OF IRIS RECOGNITION SYSTEMS
GHOST IS IN THE AIR(TRAFFIC)
GOOGLE NATIVE CLIENT - ANALYSIS OF A SECURE BROWSER PLUGIN SANDBOX
HACKING THE CORPORATE MIND: USING SOCIAL ENGINEERING TACTICS TO IMPROVE ORGANIZATIONAL SECURITY ACCEPTANCE
HACKING WITH WEBSOCKETS
HARDWARE BACKDOORING IS PRACTICAL
HERE BE BACKDOORS: A JOURNEY INTO THE SECRETS OF INDUSTRIAL FIRMWARE
HOOKIN' AIN'T EASY: BEEF INJECTION WITH MITM
HOW MANY BRICKS DOES IT TAKE TO CRACK A MICROCELL?
HOW THE ANALYSIS OF ELECTRICAL CURRENT CONSUMPTION OF EMBEDDED SYSTEMS COULD LEAD TO CODE REVERSING?
HTEXPLOIT BYPASSING HTACCESS RESTRICTIONS
HTML5 TOP 10 THREATS – STEALTH ATTACKS AND SILENT EXPLOITS
INTRUSION DETECTION ALONG THE KILL CHAIN: WHY YOUR DETECTION SYSTEM SUCKS AND WHAT TO DO ABOUT IT
IOS APPLICATION SECURITY ASSESSMENT AND AUTOMATION: INTRODUCING SIRA
IOS KERNEL HEAP ARMAGEDDON REVISITED
IOS SECURITY
LEGAL ASPECTS OF CYBERSPACE OPERATIONS
LIBINJECTION: A C LIBRARY FOR SQLI DETECTION AND GENERATION THROUGH LEXICAL ANALYSIS OF REAL WORLD ATTACKS
LOOKING INTO THE EYE OF THE METER
MAPPING AND EVOLUTION OF ANDROID PERMISSIONS
MODSECURITY AS UNIVERSAL CROSS-PLATFORM WEB PROTECTION TOOL
MY ARDUINO CAN BEAT UP YOUR HOTEL ROOM LOCK
OWNING BAD GUYS {AND MAFIA} WITH JAVASCRIPT BOTNETS
PASSIVE BLUETOOTH MONITORING IN SCAPY
PINPADPWN
PRNG: PWNING RANDOM NUMBER GENERATORS (IN PHP APPLICATIONS)
PROBING MOBILE OPERATOR NETWORKS
RECENT JAVA EXPLOITATION TRENDS AND MALWARE
SCALING UP BASEBAND ATTACKS: MORE (UNEXPECTED) ATTACK SURFACE
SEXYDEFENSE - MAXIMIZING THE HOME-FIELD ADVANTAGE
SMASHING THE FUTURE FOR FUN AND PROFIT
SNSCAT: WHAT YOU DON'T KNOW ABOUT SOMETIMES HURTS THE MOST
SQL INJECTION TO MIPS OVERFLOWS: ROOTING SOHO ROUTERS
SSRF VS. BUSINESS CRITICAL APPLICATIONS
STAMP OUT HASH CORRUPTION, CRACK ALL THE THINGS
STATE OF WEB EXPLOIT TOOLKITS
STILL PASSING THE HASH 15 YEARS LATER? USING THE KEYS TO THE KINGDOM TO ACCESS ALL YOUR DATA
STIX: THE STRUCTURED THREAT INFORMATION EXPRESSION
SYNFUL DECEIT, STATEFUL SUBTERFUGE
TARGETED INTRUSION REMEDIATION: LESSONS FROM THE FRONT LINES
THE CHRISTOPHER COLUMBUS RULE AND DHS
THE DEFENSE RESTS: AUTOMATION AND APIS FOR IMPROVING SECURITY
THE INFO LEAK ERA ON SOFTWARE EXPLOITATION
THE LAST GASP OF THE INDUSTRIAL AIR-GAP...
THE MYTH OF TWELVE MORE BYTES: SECURITY ON THE POST-SCARCITY INTERNET
THE SUBWAY LINE 8 - EXPLOITATION OF WINDOWS 8 METRO STYLE APPS
TORTURING OPENSSL
TRUST, SECURITY, AND SOCIETY
WEB TRACKING FOR YOU
WE HAVE YOU BY THE GADGETS
Welcome & Introduction to Black Hat USA 2012
WHEN SECURITY GETS IN THE WAY: PENTESTING MOBILE APPS THAT USE CERTIFICATE PINNING
WINDOWS 8 HEAP INTERNALS
WINDOWS PHONE 7 INTERNALS AND EXPLOITABILITY