Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat B
Web applications are constantly under attack, and must defend themselves. Sadly, today, most cannot.
This topic will present the proposal/idea/work from the author's master graduate project about effec
This presentation, by a former Deputy Legal Adviser to the White House National Security Council, an
Himanshu Dwivedi's presentation will discuss the severe security issues that exist in the default im
The Shatter attack uses the Windows API to subvert processes running with greater privilege than the
Ethereal is a thing of beauty, but ultimately you are constrained to a tiny window of 30-40 packets
This presentation looks at computer network defense and the legal cases of the last year that affect
It has become apparent that the greatest threat toward the survival of peer to peer, and especially
The ability to check memory references against their associated array/buffer bounds helps programmer
This talk will cover the Defense Cyber Crime Center (DC3), our mission and capabilities. The DC3 is
Databases are where your most valuable data rest, when you use a database server you implicitly trus
This talk will be on using toolkits for your pen-testing, vulnerability assessment etc. Configuring
Trust Transience: Post Intrusion SSH Hijacking explores the issues of transient trust relationships
At DefCon 11, a rogue access point setup utility named "Airsnarf" was presented by the Shmoo Group.
This is a real story of modern extortion in a cyberworld. Bots have replaced dynamite and you don't
USB peripheral devices are made by reputable manufacturers and will not misbehave by attacking the h
This discussion will cover the theoretical background of using ordinary, readable text to conceal an
An enterprise IT infrastructure is a complex and a dynamic environment that is generally described a
In the last year, there have been 45 security incidents compromising the personal information of 9.3
One of the most important weapons in our arsenal for securing applications is threat modeling. Appli