Black Hat USA 2016 - Wednesday, August 3
09:00
Kaminsky
The Hidden Architecture of our Time: Why This Internet Worked How We Could Lose It and the Role Hackers Play
10:20
Lester, Zadegan
Abusing Bleeding Edge Web Standards for AppSec Glory
Valtman, Watson
Breaking Payment Points of Interaction (POI)
Ionescu
The Linux Kernel Hidden Inside Windows 10
Metcalf
Beyond the MCSE: Active Directory for the Security Professional
Fitch, Pierce, Spisak
Capturing 0day Exploits with PERFectly Placed Hardware Traps
Pearce, Vincent
HTTP/2 & QUIC - Teaching Good Protocols To Do Bad Things
Thomas
Can You Trust Me Now? An Exploration into the Mobile Threat Landscape
Adrian
A Retrospective on the Use of Export Cryptography
Mehta
Augmenting Static Analysis Using Pintool: Ablation
11:30
Litchfield
Hackproofing Oracle eBusiness Suite
Zillner
Memory Forensics Using Virtual Machine Introspection for Cloud Computing
Hariri, JasielSpelman, Molinyawe, Smith
$hell on Earth: From Browser to System Compromise
Chen, Grassi, He, YubinFu
Subverting Apple Graphics: Practical Approaches to Remotely Gaining Root
Mirosh, Munoz
A Journey from JNDI/LDAP Manipulation to Remote Code Execution Dream Land
Benenson
Exploiting Curiosity and Context: How to Make People Click on a Dangerous Link Despite Their Security Awareness
Wallace, Wolff, Zhao
Applied Machine Learning for Data Exfil and Other Fun Topics
., Zatko
Measuring Adversary Costs to Exploit Commercial Software: The Government- Bootstrapped Non-Profit C.I.T.L.
Böck, Devlin, PhilippJovanovic, Zauner
Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS
13:50
Melrose
Drone Attacks on Industrial Wireless: A New Front in Cyber Security
Mahjoub, Mathew, Sakaly
Towards a Holistic Approach in Building Intelligence to Fight Crimeware
McGrew
Secure Penetration Testing Operations: Demonstrated Weaknesses in Learning Material and Tools
Wilhelm
Xenpwn: Breaking Paravirtualized Devices
Wei, Zhang
Adaptive Kernel Live Patching: An Open Collaborative Effort to Ameliorate Android N-Day Root Exploits
Goethem, MathyVanhoef
HEIST: HTTP Encrypted Information can be Stolen Through TCP-Windows
Demay, Lebrun
CANSPY: A Platform for Auditing CAN Devices
Jasek
GATTacking Bluetooth Smart Devices - Introducing a New BLE Proxy Tool
Nipravsky
Certificate Bypass: Hiding and Executing Malware from a Digitally Signed Executable
15:00
Grossman
An Insider's Guide to Cyber-Insurance and Security Guarantees
Kaiser
Pwning Your Java Messaging with Deserialization Vulnerabilities
Bursztein
Does Dropping USB Drives in Parking Lots and Other Places Really Work?
Mittal
AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It
Bangert, Bratus, Koo
Intra-Process Memory Protection for Applications on ARM and x86: Leveraging the ELF ABI
Chen, Chen, Kotcher, Tague, Tian, YutongPei
1000 Ways to Die in Mobile OAuth
Ortisi
Recover a RSA Private Key from a TLS Session with Perfect Forward Secrecy
Marie
I Came to Drop Bombs: Auditing the Compression Algorithm Weapon Cache
Sabanal
Into The Core - In-Depth Exploration of Windows 10 IoT Core
16:20
Uhley
Design Approaches for Security Automation
Klein, Kotler
Crippling HTTPS with Unholy PAC
Simon
Access Keys Will Kill You Before You Kill the Password
Amiga, Knafo
Account Jumping Post Infection Persistency & Lateral Movement in AWS
Bitton, Yavo
Captain Hook: Pirating AVs to Bypass Exploit Mitigations
Alsaheel, RaghavPande
Using EMET to Disable EMET
Ermishkin, MaximAndreev
Viral Video - Exploiting SSRF in Video Converters
Ossmann
GreatFET: Making GoodFET Great Again
Jang, Kim, Lee
Breaking Kernel Address Space Layout Randomization (KASLR) with Intel TSX
17:30
Barak
Watching Commodity Malware Get Sold to a Targeted Actor
Price
Building a Product Security Incident Response Team: Learnings from the Hivemind
Ziv
Unleash the Infection Monkey: A Modern Alternative to Pen-Tests
Niemantsverdriet
Security Through Design - Making Security Better by Designing for People
O'Flynn
Brute-Forcing Lockdown Harddrive PIN Codes
Geers
Cyber War in Perspective: Analysis from the Crisis in Ukraine
Hornby
Side-Channel Attacks on Everyday Applications
Bulazel
AVLeak: Fingerprinting Antivirus Emulators for Advanced Malware Evasion
Ji, Jian
The Risk from Power Lines: How to Sniff the G3 and Prime Data and Detect the Interfere Attack
Black Hat USA 2016 - Thursday, August 4
09:00
Fang
CANCELLED - How to Build the Immune System for the Internet
Wu
Dark Side of the DNS Force
O'Flynn
A Lightbulb Worm?
Yu
BadTunnel: How Do I Get Big Brother Power?
Latapie
Dungeons Dragons and Security
LorenzoFontana, Mariani
PINdemonium: A DBI-Based Generic Unpacker for Windows Executable
Mendoza
Samsung Pay: Tokenized Numbers Flaws and Issues
Vishwanath
Blunting the Phisher's Spear: A Risk-Based Approach for Defining User Training and Awarding Administrative Privileges
JoshTriplett, Sistrunk
What's the DFIRence for ICS?
Quynh
Keystone Engine: Next Generation Assembler Framework
09:45
Be'ery, Hoch
The Remote Malicious Butler Did It!
Luan
Ouroboros: Tearing Xen Hypervisor with the Snake
Nakibly
TCP Injection Attacks in the Wild - A Large Scale Study
ChrisValasek, Miller
Advanced CAN Injection Techniques for Vehicle Networks
Duggal
Understanding HL7 2.x Standards Pen Testing and Defending HL7 2.x Messages
Kralevich
The Art of Defense - How Vulnerabilities Help Shape Security Features and Mitigations in Android
Yason
Windows 10 Segment Heap Internals
Healey
Defense at Hyperscale: Technologies and Policies for a Defensible Cyberspace
JasonPolakis, Sivakorn
HTTP Cookie Hijacking in the Wild: Security and Privacy Implications
11:00
Mandt, Solnik
Demystifying the Secure Enclave Processor
Jin, Luo
Next-Generation of Exploit Kit Detection by Building Simulated Obfuscators
AndreCorrea, Peterson
Investigating DDOS - Architecture Actors and Attribution
Wojtczuk
Analysis of the Attack Surface of Windows 10 Virtualization-Based Security
Otsubo
O-checker: Detection of Malicious Documents Through Deviation from File Format Specifications
Hecker
Hacking Next-Gen ATMs: From Capture to Cashout
Tabron
Language Properties of Phone Scammers: Cyberdefense at the Level of the Human
FitzPatrick
The Tao of Hardware the Te of Implants
Kambic
Cunning with CNG: Soliciting Secrets from Schannel
12:10
Krug, McCormack
Hardening AWS Environments and Automating Incident Response for AWS Compromises
Goncharov
badWPAD
Granick, RianaPfefferkorn
When the Cops Come A-Knocking: Handling Technical Assistance Demands from Law Enforcement
Miller, Weston
Windows 10 Mitigation Improvements
Bai, Xing
Discovering and Exploiting Novel Security Vulnerabilities in Apple ZeroConf
Seymour, Tully
Weaponizing Data Science for Social Engineering: Automated E2E Spear Phishing on Twitter
Leibowitz
Horse Pill: A New Type of Linux Rootkit
Aumasson, LuisMerino
SGX Secure Enclaves in Practice: Security and Crypto Review
Galloway
AirBnBeware: Short Term Rentals Long Term Pwnage
14:30
CollinAnderson, Guarnieri
Iran's Soft-War for Internet Dominance
Silvanovich
The Year in Flash
Tan
Bad for Enterprise: Attacking BYOD Enterprise Mobile Security Solutions
Ozavci
VOIP WARS: The Phreakers Awaken
Gadsby, Kouns
OSS Security Maturity: Time to Put On Your Big Boy Pants!
Ivanov
Web Application Firewalls: Analysis of Detection Logic
Chen, Wang, Xu
Pangu 9 Internals
Chong
Breaking FIDO: Are Exploits in There?
HendrikSchwartke, MaikBrüggemann, Spenneberg
PLC-Blaster: A Worm Living Solely in the PLC
15:50
Sharkey
Breaking Hardware-Enforced Security with Hypervisors
Hund
The Beast Within - Evading Dynamic Malware Analysis Using Microsoft COM
Galperin, Quintin
When Governments Attack: State Sponsored Malware Attacks Against Activists Lawyers and Journalists
Krstic
Behind The Scenes of iOS Security
Oh
The Art of Reverse Engineering Flash Exploits
Malone
Using an Expanded Cyber Kill Chain Model to Increase Attack Resiliency
Gelernter
Timing Attacks Have Never Been So Practical: Advanced Cross-Site Search Attacks
Branco, RohitMothe
DPTrace: Dual Purpose Trace for Exploitability Analysis of Program Crashes
JonathanMayer, LeBlanc
Crumbling the Supercookie and Other Ways the FCC Protects Your Internet Traffic
17:00
Berlin
An AI Approach to Malware Similarity Analysis: Mapping the Malware Genome With a Deep Neural Network
Kelley
An Inconvenient Trust: User Attitudes Toward Security and Usability Tradeoffs for Key-Directory Encryption Systems
Stump, Wyler
Pay No Attention to That Hacker Behind the Curtain: A Look Inside the Black Hat Network
Lee, Yoon
Attacking SDN Infrastructure: Are We Ready for the Next-Gen Networking?
Bos, Bosman, Giuffrida, Razavi
Over the Edge: Silently Owning Windows 10's Secure Browser
Fogh, Gruss
Using Undocumented CPU Behavior to See into Kernel Mode and Break KASLR in the Process
Marzuoli
Call Me: Gathering Threat Intelligence on Telephony Scams to Detect Fraud
Zhang
Dangerous Hare: Hanging Attribute References Hazards Due to Vendor Customization
Terwoerds
Building Trust & Enabling Innovation for Voice Enabled IoT


Instructions

This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.

Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.