Black Hat USA 2015 - Wednesday, August 5
09:00
Granick
The Lifecycle of a Revolution
10:20
Kettle
Server-Side Template Injection: RCE for the Modern Web App
McSweeny, Soltani
How to Hack Government: Technologists as Policy Makers
Remes
Internet Plumbing for Security Professionals: The State of BGP Security
Wardle
Writing Bad @$$ Malware for OS X
Ludwig
Android Security State of the Union
Meer, Slaviero
Bring Back the Honeypots
Saxe
Why Security Data Science Matters and How Its Different: Pitfalls and Promises of Data Science Based Breach Detection and Threat Intelligence
Moore
Spread Spectrum Satcom Hacking: Attacking the GlobalStar Simplex Data Service
Dang, Quynh
Unicorn: Next Generation CPU Emulator Framework
11:30
Cui
Emanate Like a Boss: Generalized Covert Data Exfiltration with Funtenna
Gavrichenkov
Breaking HTTPS with BGP Hijacking
Li, Sun
Attacking Interoperability - An OLE Edition
Moore, Saydag
Defeating Pass-the-Hash: Separation of Powers
Park
Winning the Online Banking War
Bailey
Take a Hacker to Work Day - How Federal Prosecutors Use the CFAA
Prince
The Battle for Free Speech on the Internet
Potter, Wood
Understanding and Managing Entropy Usage
13:50
Flake, Seaborn
Exploiting the DRAM Rowhammer Bug to Gain Kernel Privileges
Pinto, Sieira
Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and Sharing
Osipov, Zaitsev
Adventures in Femtoland: 350 Yuan for Invaluable Fun
Metcalf
Red vs Blue: Modern Active Directory Attacks Detection and Protection
Peterson, Sandee, Werner
GameOver Zeus: Badguys and Backends
Billimoria, Brossard
SMBv2: Sharing More than Just Your Files
Gorenc, Hariri, Zuckerbraun
Abusing Silent Mitigations - Understanding Weaknesses Within Internet Explorers Isolated Heap and MemoryProtection
Cintz, Scott
The Tactical Application Security Program: Getting Stuff Done
Fogh, Herath
These are Not Your Grand Daddys CPU Performance Counters - CPU Hardware Performance Counters for Security
15:00
Vixie
Targeted Takedowns: Minimizing Collateral Damage Using Passive DNS
Chapman, Stone
WSUSpect - Compromising the Windows Enterprise via Windows Update
Drake
Stagefright: Scary Code in the Heart of Android
Miller, Valasek
Remote Exploitation of an Unaltered Passenger Vehicle
Guarnieri, Marquis-Boire, Marschalek
Big Game Hunting: The Peculiarities of Nation-State Malware Research
Denaro, Green
Back Doors and Front Doors Breaking the Unbreakable System
Cassidy, Lee, Leverett
Switches Get Stitches
Barbosa, Branco, Matrosov, Rodionov
Distributing the Reconstruction of High-Level Intermediate Representation for Large Scale Malware Analysis
Kouns
Stranger Danger! What is the Risk from 3rd Party Libraries?
16:20
Hilt, Wilhoit
The Little Pump Gauge that Could: Attacks Against Gas Pump Monitoring Systems
Mayer, Suarez
Faux Disk Encryption: Realities of Secure Storage on Mobile Devices
Long, Pan, Xiao
Optimized Fuzzing IOKit in iOS
Graeber
Abusing Windows Management Instrumentation (WMI) to Build a Persistent Asynchronous and Fileless Backdoor
Bazhaniuk, Bulygin, Gorobets, Matrosov
Attacking Hypervisors Using Firmware and Hardware
Fillmore
Crash & Pay: How to Own and Clone Contactless Payment Devices
Gaddam
Securing Your Big Data Environment
Bankston, Brown, Engle, Ford, Hammell
Panel: Getting It Right: Straight Talk on Threat & Information Sharing
Daugherty
Behind the Mask: The Agenda Tricks and Tactics of the Federal Trade Commission as they Regulate Cybersecurity
17:30
Ashbel, Siman
The Nodejs Highway: Attacks are at Full Throttle
Talmat
Subverting Satellite Receivers for Botnet and Profit
Long
Graphic Content Ahead: Towards Automated Scalable Analysis of Graphical Images Embedded in Malware
Yu
Cloning 3G/4G SIM Cards with a PC and an Oscilloscope: Lessons Learned in Physical Security
Dalman, Hantke
Commercial Mobile Spyware - Detecting the Undetectable
Jakobsson, Yen
How Vulnerable are We to Scams?
Silvanovich
Attacking ECMAScript Engines with Redefinition
Losev, Mellen, Moore
Mobile Point of Scam: Attacking the Square Reader
Choi, Park
THIS IS DeepERENT: Tracking App Behaviors with (Nothing Changed) Phone for Evasive Android Malware
Black Hat USA 2015 - Thursday, August 6
09:00
Huang, Liu, Wang, Zhang
The Applications of Deep Learning on Traffic Identification
McAtee, Morris
CrackLord: Maximizing Password Cracking Boxes
Larsen
Remote Physical Damage 101 - Bread and Butter Attacks
Shen
Attacking Your Trusted Core: Exploiting Trustzone on Android
Castro, Chow, Diquet
TrustKit: Code Injection on iOS 8 for the Greater Good
Ntantogian, Poulios, Xenakis
ROPInjector: Using Return Oriented Programming for Polymorphism and Antivirus Evasion
Smith
My Bro the ELK: Obtaining Context from Security Events
Vandevanter
Exploiting XXE Vulnerabilities in File Parsing Functionality
Hizver
Taxonomic Modeling of Security Threats in Software Defined Networking
09:45
Ionescu
Battle of the SKM and IUM: How Windows 10 Rewrites OS Architecture
Morgan, Morgan
Web Timing Attacks Made Practical
Pitts
Repurposing OnionDuke: A Single Case Study Around Reusing Nation State Malware
Ossmann
The NSA Playset: A Year of Toys and Tools
Domas
The Memory Sinkhole - Unleashing an x86 Design Flaw Allowing Universal Privilege Escalation
Gilger, Kozy
Bringing a Cannon to a Knife Fight
Bashan, Bobrov
Certifi-gate: Front-Door Access to Pwning Millions of Androids
Brooks, Bryant
Bypass Surgery Abusing Content Delivery Networks with Server-Side-Request Forgery (SSRF) Flash and DNS
Aharoni
The Kali Linux Dojo Workshop #1: Rolling Your Own - Generating Custom Kali Linux 20 ISOs
11:00
King
Taking Event Correlation with You
Baseggio, Evenchick
Breaking Access Controls with BLEKey
Anderson, Cardozo, Desautels, Moussouris, Zetter, Zovi
Panel: How the Wassenaar Arrangements Export Control of Intrusion Software Affects the Security Industry
Klein, Peters
Defeating Machine Learning: What Your Security Vendor is Not Telling You
Xu
Ah! Universal Android Rooting is Back
Kubecka
How to Implement IT Security After a Cyber Meltdown
Crane, Homescu, Liebchen, Sadeghi
Return to Where? You Cant Exploit What You Cant Find
Pickett
Staying Persistent in Software Defined Networks
The Kali Linux Dojo Workshop #2: Kali USB Setups with Persistent Stores and LUKS Nuke Support
12:10
Klick, Lau, Malchow, Marzin, Roth
Internet-Facing PLCs - A New Back Orifice
Barisani, Bianco
Forging the USB Armory an Open Source Secure Flash-Drive-Sized Computer
Mayorkas
Information Access and Information Sharing: Where We are and Where We are Going
Zadeh
From False Positives to Actionable Analysis: Behavioral Intrusion Detection Machine Learning and the SOC
Wei, Zhang
Fingerprints on Mobile Devices: Abusing and Leaking
Strobl, Zillner
ZigBee Exploited the Good the Bad and the Ugly
Zhang
Bypass Control Flow Guard Comprehensively
Evron, Sher, Sysman
Breaking Honeypots for Fun and Profit
Hubbard, Toonk
BGP Stream
14:30
Hanif, Lengyel, Webster
Internet-Scale File Analysis
Auger, Sandvik
When IoT Attacks: Hacking a Linux-Powered Rifle
Jaffer, Jaycox
Is the NSA Still Listening to Your Phone Calls? A Surveillance Debate: Congressional Success or Epic Fail
Bell
Automated Human Vulnerability Scanning with AVA
Conti, Cross, Raymond
Pen Testing a City
Davis
Broadcasting Your Attack: Security Testing DAB Radio in Cars
Weinmann
Assessing and Exploiting BigNum Vulnerabilities
Yason
Understanding the Attack Surface and Attack Resilience of Project Spartans New EdgeHTML Rendering Engine
Chen, Wang, XU
Review and Exploit Neglected Attack Surfaces in iOS 8
15:50
Hudson, Kallenberg, Kovah
ThunderStrike 2: Sith Strike
Arnaboldi
Abusing XSLT for Practical Attacks
Krotofil
Rocking the Pocket Book: Hacking Chemical Plant for Competition and Extortion
Thomas
Advanced IC Reverse Engineering Techniques: In Depth Analysis of a Modern Smart Card
Forshaw
Social Engineering the Windows Kernel: Finding and Exploiting Token Handling Vulnerabilities
Davis, Wolff
Deep Learning on Disassembly
Price
HI THIS IS URGENT PLZ FIX ASAP: Critical Vulnerabilities and Bug Bounty Programs
Kruegel, Shoshitaishvili
Using Static Binary Analysis to Find Vulnerabilities and Backdoors in Firmware
Mulliner, Neugschwandtner
Breaking Payloads with Runtime Code Stripping and Image Freezing
17:00
Nafeez
Dom Flow - Untangling the DOM for More Easy-Juicy Bugs
Gong
Fuzzing Android System Services by Binder Call to Escalate Privilege
Lakhotia, Notani
Harnessing Intelligence from Malware Repositories
Kirda
Most Ransomware Isnt as Complex as You Might Think
Gorbaty, Wang
FileCry - The New Age of XXE
D'Antoine
Exploiting Out-of-Order Execution for Covert Cross-VM Communication
Keenan
Hidden Risks of Biometric Identifiers and How to Avoid Them
Choi
API Deobfuscator: Resolving Obfuscated API Functions in Modern Packers
Stump, Wyler
Dance Like Nobodys Watching Encrypt Like Everyone Is: A Peek Inside the Black Hat Network


Instructions

This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.

Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.