Black Hat USA 2018 - Wednesday, August 8
09:00
Tabriz
Optimistic Dissatisfaction with the Status Quo: Steps We Must Take to Improve Security in Complex Landscapes
10:30
Tomasello
Holding on for Tonight: Addiction in InfoSec
Goland, Naor
Dissecting Non-Malicious Artifacts: One IP at a Time
Marcil
Edge Side Include Injection: Abusing Caching Servers into SSRF and Transparent Session Hijacking
Ducau, Harang
Measuring the Speed of the Red Queen's Race; Adaption and Evasion in Malware
Malmquist
Exposing the Bait: A Qualitative Look at the Impact of Autonomous Peer Communication to Enhance Organizational Phishing Detection
Bengtson
Detecting Credential Compromise in AWS
Volokitin
Software Attacks on Hardware Wallets
Rousseau, Seymour
Finding Xori: Malware Analysis Triage with Automated Disassembly
Friedman
How I Learned to Stop Worrying and Love the SBOM
11:15
Dykstra, Paul
Stress and Hacking: Understanding Cognitive Stress in Tactical Cyber Ops
Groß
New Trends in Browser Exploitation: Attacking Client-Side JIT Compilers
Chen
KeenLab iOS Jailbreak Internals: Userland Read-Only Memory can be Dangerous
Desclaux, Mougey
Miasm: Reverse Engineering Framework
Everette, Postnikoff, Terp
From Bot to Robot: How Abilities and Law Change with Physicality
Bialek, Joly
A Dive in to Hyper-V Architecture & Vulnerabilities
Saxe
Deep Neural Networks for Hackers: Methods Applications and Open Source Tools
Little
Blockchain Autopsies - Analyzing Ethereum Smart Contract Deaths
Carcano, Dragoni, Krotofil
TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of Industrial Control Systems Forever
13:30
Bailey, Bender, Elazari, Granick, Menn, Rosen
Legal Landmines: How Law and Policy are Rapidly Shaping Information Security
Milburn, Pellicer, Timmers, Veredas, Wiersma, Witteman
There will be Glitches: Extracting and Analyzing Automotive Firmware Efficiently
Tam
No Royal Road … Notes on Dangerous Game
Nafeez
Compression Oracle Attacks on VPN Networks
Valadon
Reversing a Japanese Wireless SD Card - From Zero to Code Execution
Bazhaniuk, Michael, Shkatov
Remotely Attacking System Firmware
Camurati, Francillon, Hayes, Muench, Poeplau
Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers
Camredon, Lenoir
Deep Dive into an ICS Firewall Looking for the Fire Hole
Gordeychik, Timorin
Too Soft\[ware Defined\] Networks: SD-WAN Vulnerability Assessment
14:40
Shostack
Threat Modeling in 2018: Attacks Impacts and Other Updates
Dameff, Radcliffe
Mental Health Hacks: Fighting Burnout Depression and Suicide in the Hacker Community
Anise, Wright
Don't @ Me: Hunting Twitter Bots at Scale
Donenfeld
WireGuard: Next Generation Secure Network Tunnel
Christensen, Graeber
Subverting Sysmon: Application of a Formalized Security Product Evasion Methodology
Gruss, Lipp, Schwarz
Meltdown: Basics Details Consequences
Metcalf
From Workstation to Domain Admin: Why Secure Administration isn't Secure and How to Fix it
Wixey
Every ROSE has its Thorn: The Dark Art of Remote Online Social Engineering
Soler, Waisman
The Unbearable Lightness of BMC's
16:00
Be'ery, Marcovich, Ron, Shulman
Open Sesame: Picking Locks with Cortana
Borgaonkar, Shaik
LTE Network Automation Under Threat
Mulasmajic, Peterson
Why so Spurious? How a Highly Error-Prone x86/x64 CPU Feature can be Abused to Achieve Local Privilege Escalation on Many Operating Systems
Beer
A Brief History of Mitigation: The Path to EL1 in iOS 11
Tsai
Breaking Parser Logic: Take Your Path Normalization off and Pop 0days Out!
Doerr, Linton, Manion, Robinson
Behind the Speculative Curtain: The True Story of Fighting Meltdown and Spectre
Roth
Breaking the IIoT: Hacking industrial Control Gateways
Weston
ZEROing Trust: Do Zero Trust Approaches Deliver Real Security?
Valsorda
Squeezing a Key through a Carry Bit
17:05
Munro
InfoSec Philosophies for the Corrupt Economy
Heilman, Narula
A Tangled Curl: Attacks on the Curl-P Hash Function Leading to Signature Forgeries in the IOTA Signature Scheme
Li
AFL's Blindspot and How to Resist AFL Fuzzing for Arbitrary ELF Binaries
O'flynn
I for One Welcome Our New Power Analysis Overlords
Kashyap, Singh
Back to the Future: A Radical Insecure Design of KVM on ARM
Guri
The Air-Gap Jumpers
Lusthaus
Is the Mafia Taking Over Cybercrime?
Perlow
Beating the Blockchain by Mapping Out Decentralized Namecoin and Emercoin Infrastructure
Peterson
How can Communities Move Forward After Incidents of Sexual Harassment or Assault?
Black Hat USA 2018 - Thursday, August 9
09:00
Gadsby
Stop that Release There's a Vulnerability!
Schuermann
Lessons from Virginia - A Comparative Forensic Analysis of WinVote Voting Machines
Silvanovich
The Problems and Promise of WebAssembly
Schranz
ARTist - A Novel Instrumentation Framework for Reversing and Analyzing Android Apps and the Middleware
Hart
Real Eyes Realize Real Lies: Beating Deception Technologies
Camp, Das, Russo
Two-Factor Authentication Usable or Not? A Two-Phase Usability Study of the FIDO U2F Security Key
Slowik
Demystifying PTSD in the Cybersecurity Environment
Wardle
Fire & Ice: Making and Breaking macOS Firewalls
Gollnick, Smyth
Money-rity Report: Using Intelligence to Predict the Next Payment Card Fraud Victims
09:45
Kononovich, Stennikov
Black Box is Dead. Long Live Black Box!
Holtz
The Science of Hiring and Retaining Female Cybersecurity Engineers
Lewis, Lute, Moss, Painter
New Norms and Policies in Cyber-Diplomacy
Aqil, Seymour
Your Voice is My Passport
Shattuck
Snooping on Cellular Gateways and Their Critical Role in ICS
Ludwig
Identity Theft: Attacks on SSO Systems
Desimone, Landau
Kernel Mode Threats and Practical Defenses
Ionescu, Viala
The Windows Notification Facility: Peeling the Onion of the Most Undocumented Kernel Attack Surface Yet
Kobayashi, Suzuki
Reconstruct the World from Vanished Shadow: Recovering Deleted VSS Snapshots
11:00
Geesaman
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform Capabilities
Guilfanov
Decompiler Internals: Microcode
Blaich, Flossman
Stealth Mango and the Prevalence of Mobile Surveillanceware
Bélanger, Endahl
A Deep Dive into macOS MDM (and How it can be Compromised)
Dresen, Müller
Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels
Domas
GOD MODE UNLOCKED - Hardware Backdoors in x86 CPUs
Marty
AI & ML in Cyber Security - Why Algorithms are Dangerous
Hernandez
Are You Trading Stocks Securely? Exposing Security Flaws in Trading Technologies
Bland, Dameff, Tully
Pestilential Protocol: How Unsecure HL7 Messages Threaten Patient Lives
12:10
Crowley, Paredes, Savage
Outsmarting the Smart City
Engler, Lukasiewicz
WebAssembly: A New World of Native Exploits on the Browser
Alguacil, Moya
Playback: A TLS 1.3 Story
Gras
TLBleed: When Protecting Your CPU Caches is Not Enough
Ertl, Fogh, Miller
Wrangling with the Ghost: An Inside Story of Mitigating Speculative Execution Side Channel Vulnerabilities
Delpy, Toux
So I became a Domain Controller
Miller, Valasek
Applied Self-Driving Car Security
Parikh, Stewart, Treit
Protecting the Protector Hardening Machine Learning Defenses Against Adversarial Attacks
Hui, Kang
None of My Pixel is Your Business: Active Watermarking Cancellation Against Video Streaming Service
14:30
Bulazel
Windows Offender: Reverse Engineering Windows Defender's Antivirus Emulator
Su, Wu, Xing
From Thousands of Hours to a Couple of Minutes: Automating Exploit Generation for Arbitrary Types of Kernel Vulnerabilities
Haken
Automated Discovery of Deserialization Gadget Chains
Gruss, Lipp, Schwarz
Another Flip in the Row
Palansky
Legal Liability for IOT Cybersecurity Vulnerabilities
Carlsson, Harris
Catch me Yes we can! – Pwning Social Engineers using Natural Language Processing Techniques in Real-Time
Grassi, Liu, Xie
Exploitation of a Modern Smartphone Baseband
Santamarta
Last Call for SATCOM Security
Greenhagen, Hurt, Thayer
How can Someone with Autism Specifically Enhance the Cyber Security Workforce?
15:50
Galloway, Yunusov
For the Love of Money: Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems
Lipner
SDL That Won't Break the Bank
Rikansrud
Mainframe \[z/OS\] Reverse Engineering and Exploit Development
Rabet
Hardening Hyper-V through Offensive Security Research
Ege, Woudenberg
Lowering the Bar: Deep Learning for Side Channel Analysis
Costin, Zaddach
IoT Malware: Comprehensive Survey Analysis Framework and Case Studies
Butts, Rios
Understanding and Exploiting Implanted Medical Devices
Kettle
Practical Web Cache Poisoning: Redefining 'Unexploitable'
Seeber
SirenJack: Cracking a 'Secure' Emergency Warning Siren System
17:00
Kim, Lee, Shin, Woo
The Finest Penetration Testing Framework for Software-Defined Networks
Maier, Shastry, Ulitzsch
Follow the White Rabbit: Simplifying Fuzz Testing Using FuzzExMachina
Stone
Unpacking the Packed Unpacker: Reverse Engineering an Android Anti-Analysis Native Library
Stump, Wyler
Lessons and Lulz: The 4th Annual Black Hat USA NOC Report
Thomas
It's a PHP Unserialization Vulnerability Jim but Not as We Know It
Mcgrew
An Attacker Looks at Docker: Approaching Multi-Container Applications
Jang, Kirat, Stoecklin
DeepLocker - Concealing Targeted Attacks with AI Locksmithing
Du, Liu, Nie, Zhang
Over-the-Air: How we Remotely Compromised the Gateway BCM and Autopilot ECUs of Tesla Cars
Böck, Young
Return of Bleichenbacher's Oracle Threat (ROBOT)


Instructions

This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.

Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.